MCQOPTIONS
Saved Bookmarks
This section includes 1917 Mcqs, each offering curated multiple-choice questions to sharpen your UGC-NET knowledge and support exam preparation. Choose a topic below to get started.
| 1201. |
The Fiber Distributed Data Interface uses: |
| A. | single mode fibers and LEDs |
| B. | multimode fibers and LEDs |
| C. | single mode fibers and ILDs |
| D. | multimode fibers and ILDs |
| Answer» C. single mode fibers and ILDs | |
| 1202. |
Match the following:a. Data link layer i. Flow controlb. Network layer ii. Node to node deliveryc. Transport layer iii. Mail servicesd. Application layer iv. RoutingCodes: a b c d |
| A. | ii i iv iii |
| B. | ii iv i iii |
| C. | ii i iii iv |
| D. | ii iv iii i |
| Answer» C. ii i iii iv | |
| 1203. |
Start and stop bits are used in serial communications for |
| A. | Error detection |
| B. | Error correction |
| C. | Synchronization |
| D. | Slowing down the communication |
| Answer» D. Slowing down the communication | |
| 1204. |
The data unit in the TCP/IP application layer is called a ............... |
| A. | message |
| B. | segment |
| C. | datagram |
| D. | frame |
| Answer» B. segment | |
| 1205. |
Transmission of N signals, each band limited to fm Hz by TDM, requires a minimum band-width of: |
| A. | fm |
| B. | 2 fm |
| C. | N fm |
| D. | 2N fm |
| Answer» D. 2N fm | |
| 1206. |
Which of the following fields in IPv4 datagram is not related to fragmentation? |
| A. | Type of service |
| B. | Fragment offset |
| C. | Flags |
| D. | Identification |
| Answer» B. Fragment offset | |
| 1207. |
For the transmission of the signal, Bluetooth wireless technology uses |
| A. | time division multiplexing |
| B. | frequency division multiplexing |
| C. | time division duplex |
| D. | frequency division duplex |
| Answer» D. frequency division duplex | |
| 1208. |
An example of an adaptive routing algorithm is: |
| A. | distance vector routing |
| B. | flooding |
| C. | selective flooding |
| D. | shortest path routing |
| Answer» B. flooding | |
| 1209. |
If the period of a signal is 1000 ms, then what is its frequency in kilohertz ? |
| A. | 10^–3 KHz |
| B. | 10^–2 KHz |
| C. | 10^–1 KHz |
| D. | 1 KHz |
| Answer» B. 10^–2 KHz | |
| 1210. |
The network 198.78.41.0 is a: |
| A. | Class A Network |
| B. | Class B Network |
| C. | Class C Network |
| D. | Class D Network |
| Answer» D. Class D Network | |
| 1211. |
Consider ISO-OSI network architecture reference model. Session layer of this model offers dialog control, token management and .................. as services. |
| A. | Synchronization |
| B. | Asynchronization |
| C. | Flow control |
| D. | Errors |
| Answer» B. Asynchronization | |
| 1212. |
Which of the following services is not provided by wireless access point in 802.11 WLAN? |
| A. | Association |
| B. | Disassociation |
| C. | Error Correction |
| D. | Integration |
| Answer» D. Integration | |
| 1213. |
A smart modem can dial, hangup and answer incoming calls automatically. Can you tell who provides the appropriate instructions to the modem for this purpose ? |
| A. | Communication software |
| B. | Error detection protocols |
| C. | Link access procedure (LAP) |
| D. | Telecommunications |
| Answer» B. Error detection protocols | |
| 1214. |
Error control is needed at the transport layer because of potential error occurring .............. |
| A. | from transmission line noise |
| B. | in router |
| C. | from out of sequence delivery |
| D. | from packet losses |
| Answer» C. from out of sequence delivery | |
| 1215. |
An example of a public key encryption algorithm is: |
| A. | Caesar cipher algorithm |
| B. | DES algorithm |
| C. | AES algorithm |
| D. | Knapsack algorithm |
| Answer» E. | |
| 1216. |
In case of Bus/Tree topology signal balancing issue is overcome by: |
| A. | Strong Transmitter |
| B. | Polling |
| C. | Segmentation |
| D. | Modulation |
| Answer» D. Modulation | |
| 1217. |
A TCP server must prepare to accept a connection attempt from a TCP client by calling the function: |
| A. | connect() |
| B. | bind() |
| C. | accept() |
| D. | listen() |
| Answer» E. | |
| 1218. |
GSM/CDMA systems: |
| A. | are limited to very low speed data |
| B. | require no local loop wires |
| C. | are predominantly used for voice |
| D. | all of the above |
| Answer» E. | |
| 1219. |
Bluetooth technology uses the transmission media. |
| A. | Radio links |
| B. | Microwave links |
| C. | VSAT communication |
| D. | Optical fiber links |
| Answer» B. Microwave links | |
| 1220. |
In which circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM ? |
| A. | Space division |
| B. | Time division |
| C. | Virtual |
| D. | Packet |
| Answer» C. Virtual | |
| 1221. |
Hamming distance between 100101000110 and 110111101101 is |
| A. | 3 |
| B. | 4 |
| C. | 5 |
| D. | 6 |
| Answer» E. | |
| 1222. |
The unlicensed National Information Infrastructure band operates at the …………. frequency. |
| A. | 2.4 GHz |
| B. | 5 GHz |
| C. | 33 MHz |
| D. | 5 MHz |
| Answer» C. 33 MHz | |
| 1223. |
In classful addressing, the IP address 190.255.254.254 belongs to |
| A. | Class A |
| B. | Class B |
| C. | Class C |
| D. | Class D |
| Answer» C. Class C | |
| 1224. |
The science and art of breaking ciphers |
| A. | Cryptography |
| B. | Steganography |
| C. | Cryptanalysis |
| D. | Steganalysis |
| Answer» D. Steganalysis | |
| 1225. |
End-to-End connectivity is provided from Last-to-Last in |
| A. | Network layer |
| B. | Session layer |
| C. | Transport layer |
| D. | Data link layer |
| Answer» D. Data link layer | |
| 1226. |
The threshold effect in demodulator is |
| A. | exhibited by all demodulator, when the input signal to noise ratio is low. |
| B. | the rapid fall on output signal to noise ratio when the input signal to noise ratio fall below a particular value. |
| C. | the property exhibited by all A.M. suppressed carrier coherent demodulator. |
| D. | the property exhibited by correlation receiver. |
| Answer» C. the property exhibited by all A.M. suppressed carrier coherent demodulator. | |
| 1227. |
Identify the incorrect statement: |
| A. | The ATM adoption layer is not service dependent. |
| B. | Logical connections in ATM are referred to as virtual channel connections. |
| C. | ATM is streamlined protocol with minimal error and flow control capabilities. |
| D. | ATM is also known as cell delays. |
| Answer» B. Logical connections in ATM are referred to as virtual channel connections. | |
| 1228. |
The bit rate of a signal is 3000 bps. If each signal unit carries 6 bits, the baud rate of the signal is ............... |
| A. | 500 baud/sec |
| B. | 1000 baud/sec |
| C. | 3000 baud/sec |
| D. | 18000 baud/sec |
| Answer» B. 1000 baud/sec | |
| 1229. |
Check sum used along with each packet computes the sum of the data, where data is treated as a sequence of |
| A. | Integer |
| B. | Character |
| C. | Real numbers |
| D. | Bits |
| Answer» E. | |
| 1230. |
In an IP packet, header checksum computes: |
| A. | 1’s complement sum of 16 bit words in the header without data field |
| B. | 2’s complement sum of 16 bit words in the header without data field |
| C. | 1’s complement sum of 16 bit words in the header including data field |
| D. | 2’s complement sum of 16 bit words in the header including data field |
| Answer» B. 2’s complement sum of 16 bit words in the header without data field | |
| 1231. |
What is the routing algorithm used by RIP and IGRP ? |
| A. | OSPF |
| B. | Link-state |
| C. | Dynamic |
| D. | Dijkestra vector |
| Answer» E. | |
| 1232. |
Which of the following option with reference to UNIX operating system is not correct? |
| A. | INT signal is sent by the terminal driver when one types < Control-C > and it is a request to terminate the current operation. |
| B. | TERM is a request to terminate execution completely. The receiving process will clean up its state and exit. |
| C. | QUIT is similar to TERM, except that it defaults to producing a core dump if not caught. |
| D. | KILL is a blockable signal. |
| Answer» E. | |
| 1233. |
Match the following vi commands in Unix:List-I List-IIa. :w i. saves the file and quits editing modeb. :x ii. escapes unix shellc. :q iii. saves file and remains in editing moded. :sh iv. quits editing mode and no changes are saved to the fileCodes: a b c d |
| A. | ii iii i iv |
| B. | iv iii ii i |
| C. | iii iv i ii |
| D. | iii i iv ii |
| Answer» E. | |
| 1234. |
In UNIX, processes that have finished execution but have not yet had their status collected are known as ................ |
| A. | Sleeping processes |
| B. | Stopped Processes |
| C. | Zombie Processes |
| D. | Orphan Processes |
| Answer» D. Orphan Processes | |
| 1235. |
In Unix, the login prompt can be changed by changing the contents of the file ............... |
| A. | contrab |
| B. | init |
| C. | gettydefs |
| D. | inittab |
| Answer» D. inittab | |
| 1236. |
Which of the following statement is not correct with reference to cron daemon in UNIX O.S? |
| A. | The cron daemon is the standard tool for running commands on a pre-determined schedule. |
| B. | It starts when the system boots and runs as long as the system is up. |
| C. | Cron reads configuration files that contain list of command lines and the times at which they invoked. |
| D. | Crontab for individual users are not stored. |
| Answer» E. | |
| 1237. |
In Unix, the command to enable execution permission for file “mylife” by all is ................ |
| A. | Chmod ugo+X myfile |
| B. | Chmod a+X myfile |
| C. | Chmod +X myfile |
| D. | All of the above |
| Answer» E. | |
| 1238. |
Consider the following UNIX command:sort < in > temp; head -30 < temp; rm tempWhich of the following functions shall be performed by this command? |
| A. | Sort, taking the input from "temp", prints 30 lines from temp and delete the file temp |
| B. | Sort the file "temp", removes 30 lines from temp and delete the file temp |
| C. | Sort, taking the input from "in" and writing the output to "temp" then prints 30 lines from temp on terminal. Finally "temp" is removed |
| D. | Sort, taking the input from 'temp" and then prints 30 lines from "temp" on terminal. Finally "temp" is removed |
| Answer» D. Sort, taking the input from 'temp" and then prints 30 lines from "temp" on terminal. Finally "temp" is removed | |
| 1239. |
The mv command changes |
| A. | the inode |
| B. | the inode-number |
| C. | the directory entry |
| D. | both the directory entry and the inode |
| Answer» D. both the directory entry and the inode | |
| 1240. |
Which command allows you to view your file 24 lines at a time ? |
| A. | More |
| B. | Cat |
| C. | Pg |
| D. | None of the above |
| Answer» B. Cat | |
| 1241. |
A UNIX file system has 1 KB block size and 4-byte disk addresses. What is the maximum file size if the inode contains ten direct block entries, one single indirect block entry, one double indirect block entry and one triple indirect block entry? |
| A. | 30 GB |
| B. | 64 GB |
| C. | 16 GB |
| D. | 1 GB |
| Answer» D. 1 GB | |
| 1242. |
A user level process in Unix traps the signal sent on a Ctrl + C input and has a signal handling routine that saves appropriate files before terminating the process. When a Ctrl + C input is given to this process, what is the mode in which the signal handling routine executes ? |
| A. | User mode |
| B. | Kernel mode |
| C. | Superuser mode |
| D. | Privileged mode |
| Answer» C. Superuser mode | |
| 1243. |
The Unix command used to find out the number of characters in a file is |
| A. | nc |
| B. | wc |
| C. | chcnt |
| D. | lc |
| Answer» C. chcnt | |
| 1244. |
Which of the following set of Unix commands will always display “WELCOME” ? |
| A. | export title=WELCOME; Echo $title |
| B. | title = WELCOME; export $ title ; sh –c “echo $title” |
| C. | title = WELCOME; export title ; sh –c “echo $title” |
| D. | title = WELCOME; echo $title |
| Answer» D. title = WELCOME; echo $title | |
| 1245. |
Which of the following OS treats hardware as a file system? |
| A. | UNIX |
| B. | DOS |
| C. | Windows NT |
| D. | None of the above |
| Answer» B. DOS | |
| 1246. |
An example of a memory management system call in UNIX is: |
| A. | fork |
| B. | mmap |
| C. | sigaction |
| D. | execve |
| Answer» C. sigaction | |
| 1247. |
In Linux, the subdirectory that contains system configuration files including user passwords: |
| A. | /boot |
| B. | /usr |
| C. | /etc |
| D. | /proc |
| Answer» D. /proc | |
| 1248. |
Which of the following is not an Unix Command ? |
| A. | Whoami |
| B. | wc |
| C. | ls |
| D. | put |
| Answer» E. | |
| 1249. |
Which of the following changes permission to deny write permission to group and others? |
| A. | Chmod go-w filex |
| B. | Chmod go w filex |
| C. | Chmod go=w filex |
| D. | None of the above |
| Answer» B. Chmod go w filex | |
| 1250. |
The environment variable in Linux, that contain a list of directories the shell automatically recognizes. |
| A. | $PATH |
| B. | $ENV |
| C. | $USER |
| D. | $GREP |
| Answer» B. $ENV | |