Explore topic-wise MCQs in UGC-NET.

This section includes 1917 Mcqs, each offering curated multiple-choice questions to sharpen your UGC-NET knowledge and support exam preparation. Choose a topic below to get started.

1201.

The Fiber Distributed Data Interface uses:

A. single mode fibers and LEDs
B. multimode fibers and LEDs
C. single mode fibers and ILDs
D. multimode fibers and ILDs
Answer» C. single mode fibers and ILDs
1202.

Match the following:a. Data link layer                      i. Flow controlb. Network layer                       ii. Node to node deliveryc. Transport layer                     iii. Mail servicesd. Application layer                 iv. RoutingCodes:      a   b    c   d

A. ii    i    iv   iii
B. ii   iv    i    iii
C. ii    i    iii   iv
D. ii   iv   iii    i
Answer» C. ii    i    iii   iv
1203.

Start and stop bits are used in serial communications for

A. Error detection
B. Error correction
C. Synchronization
D. Slowing down the communication
Answer» D. Slowing down the communication
1204.

The data unit in the TCP/IP application layer is called a ...............

A. message
B. segment
C. datagram
D. frame
Answer» B. segment
1205.

Transmission of N signals, each band limited to fm Hz by TDM, requires a minimum band-width of:

A. fm
B. 2 fm
C. N fm
D. 2N fm
Answer» D. 2N fm
1206.

Which of the following fields in IPv4 datagram is not related to fragmentation?

A. Type of service
B. Fragment offset
C. Flags
D. Identification
Answer» B. Fragment offset
1207.

For the transmission of the signal, Bluetooth wireless technology uses

A. time division multiplexing
B. frequency division multiplexing
C. time division duplex
D. frequency division duplex
Answer» D. frequency division duplex
1208.

An example of an adaptive routing algorithm is:

A. distance vector routing
B. flooding
C. selective flooding
D. shortest path routing
Answer» B. flooding
1209.

If the period of a signal is 1000 ms, then what is its frequency in kilohertz ?

A. 10^–3 KHz
B. 10^–2 KHz
C. 10^–1 KHz
D. 1 KHz
Answer» B. 10^–2 KHz
1210.

The network 198.78.41.0 is a:

A. Class A Network
B. Class B Network
C. Class C Network
D. Class D Network
Answer» D. Class D Network
1211.

Consider ISO-OSI network architecture reference model. Session layer of this model offers dialog control, token management and .................. as services.

A. Synchronization
B. Asynchronization
C. Flow control
D. Errors
Answer» B. Asynchronization
1212.

Which of the following services is not provided by wireless access point in 802.11 WLAN?

A. Association
B. Disassociation
C. Error Correction
D. Integration
Answer» D. Integration
1213.

A smart modem can dial, hangup and answer incoming calls automatically. Can you tell who provides the appropriate instructions to the modem for this purpose ?

A. Communication software
B. Error detection protocols
C. Link access procedure (LAP)
D. Telecommunications
Answer» B. Error detection protocols
1214.

Error control is needed at the transport layer because of potential error occurring ..............

A. from transmission line noise
B. in router
C. from out of sequence delivery
D. from packet losses
Answer» C. from out of sequence delivery
1215.

An example of a public key encryption algorithm is:

A. Caesar cipher algorithm
B. DES algorithm
C. AES algorithm
D. Knapsack algorithm
Answer» E.
1216.

In case of Bus/Tree topology signal balancing issue is overcome by:

A. Strong Transmitter
B. Polling
C. Segmentation
D. Modulation
Answer» D. Modulation
1217.

A TCP server must prepare to accept a connection attempt from a TCP client by calling the function:

A. connect()
B. bind()
C. accept()
D. listen()
Answer» E.
1218.

GSM/CDMA systems:

A. are limited to very low speed data
B. require no local loop wires
C. are predominantly used for voice
D. all of the above
Answer» E.
1219.

Bluetooth technology uses the transmission media.

A. Radio links
B. Microwave links
C. VSAT communication
D. Optical fiber links
Answer» B. Microwave links
1220.

In which circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM ?

A. Space division
B. Time division
C. Virtual
D. Packet
Answer» C. Virtual
1221.

Hamming distance between 100101000110 and 110111101101 is

A. 3
B. 4
C. 5
D. 6
Answer» E.
1222.

The unlicensed National Information Infrastructure band operates at the …………. frequency.

A. 2.4 GHz
B. 5 GHz
C. 33 MHz
D. 5 MHz
Answer» C. 33 MHz
1223.

In classful addressing, the IP address 190.255.254.254 belongs to

A. Class A
B. Class B
C. Class C
D. Class D
Answer» C. Class C
1224.

The science and art of breaking ciphers

A. Cryptography
B. Steganography
C. Cryptanalysis
D. Steganalysis
Answer» D. Steganalysis
1225.

End-to-End connectivity is provided from Last-to-Last in

A. Network layer
B. Session layer
C. Transport layer
D. Data link layer
Answer» D. Data link layer
1226.

The threshold effect in demodulator is

A. exhibited by all demodulator, when the input signal to noise ratio is low.
B. the rapid fall on output signal to noise ratio when the input signal to noise ratio fall below a particular value.
C. the property exhibited by all A.M. suppressed carrier coherent demodulator.
D. the property exhibited by correlation receiver.
Answer» C. the property exhibited by all A.M. suppressed carrier coherent demodulator.
1227.

Identify the incorrect statement:

A. The ATM adoption layer is not service dependent.
B. Logical connections in ATM are referred to as virtual channel connections.
C. ATM is streamlined protocol with minimal error and flow control capabilities.
D. ATM is also known as cell delays.
Answer» B. Logical connections in ATM are referred to as virtual channel connections.
1228.

The bit rate of a signal is 3000 bps. If each signal unit carries 6 bits, the baud rate of the signal is ...............

A. 500 baud/sec
B. 1000 baud/sec
C. 3000 baud/sec
D. 18000 baud/sec
Answer» B. 1000 baud/sec
1229.

Check sum used along with each packet computes the sum of the data, where data is treated as a sequence of

A. Integer
B. Character
C. Real numbers
D. Bits
Answer» E.
1230.

In an IP packet, header checksum computes:

A. 1’s complement sum of 16 bit words in the header without data field
B. 2’s complement sum of 16 bit words in the header without data field
C. 1’s complement sum of 16 bit words in the header including data field
D. 2’s complement sum of 16 bit words in the header including data field
Answer» B. 2’s complement sum of 16 bit words in the header without data field
1231.

What is the routing algorithm used by RIP and IGRP ?

A. OSPF
B. Link-state
C. Dynamic
D. Dijkestra vector
Answer» E.
1232.

Which of the following option with reference to UNIX operating system is not correct?

A. INT signal is sent by the terminal driver when one types < Control-C > and it is a request to terminate the current operation.
B. TERM is a request to terminate execution completely. The receiving process will clean up its state and exit.
C. QUIT is similar to TERM, except that it defaults to producing a core dump if not caught.
D. KILL is a blockable signal.
Answer» E.
1233.

Match the following vi commands in Unix:List-I                   List-IIa.   :w        i. saves the file and quits editing modeb.   :x         ii. escapes unix shellc.   :q         iii. saves file and remains in editing moded. :sh       iv. quits editing mode and no changes are saved to the fileCodes:     a   b  c  d

A. ii   iii  i  iv
B. iv  iii  ii  i
C. iii  iv  i  ii
D. iii  i   iv ii
Answer» E.
1234.

In UNIX, processes that have finished execution but have not yet had their status collected are known as ................

A. Sleeping processes
B. Stopped Processes
C. Zombie Processes
D. Orphan Processes
Answer» D. Orphan Processes
1235.

In Unix, the login prompt can be changed by changing the contents of the file ...............

A. contrab
B. init
C. gettydefs
D. inittab
Answer» D. inittab
1236.

Which of the following statement is not correct with reference to cron daemon in UNIX O.S?

A. The cron daemon is the standard tool for running commands on a pre-determined schedule.
B. It starts when the system boots and runs as long as the system is up.
C. Cron reads configuration files that contain list of command lines and the times at which they invoked.
D. Crontab for individual users are not stored.
Answer» E.
1237.

In Unix, the command to enable execution permission for file “mylife” by all is ................

A. Chmod ugo+X myfile
B. Chmod a+X myfile
C. Chmod +X myfile
D. All of the above
Answer» E.
1238.

Consider the following UNIX command:sort < in > temp; head -30 < temp; rm tempWhich of the following functions shall be performed by this command?

A. Sort, taking the input from "temp", prints 30 lines from temp and delete the file temp
B. Sort the file "temp", removes 30 lines from temp and delete the file temp
C. Sort, taking the input from "in" and writing the output to "temp" then prints 30 lines from temp on terminal. Finally "temp" is removed
D. Sort, taking the input from 'temp" and then prints 30 lines from "temp" on terminal. Finally "temp" is removed
Answer» D. Sort, taking the input from 'temp" and then prints 30 lines from "temp" on terminal. Finally "temp" is removed
1239.

The mv command changes

A. the inode
B. the inode-number
C. the directory entry
D. both the directory entry and the inode
Answer» D. both the directory entry and the inode
1240.

Which command allows you to view your file 24 lines at a time ?

A. More
B. Cat
C. Pg
D. None of the above
Answer» B. Cat
1241.

A UNIX file system has 1 KB block size and 4-byte disk addresses. What is the maximum file size if the inode contains ten direct block entries, one single indirect block entry, one double indirect block entry and one triple indirect block entry?

A. 30 GB
B. 64 GB
C. 16 GB
D. 1 GB
Answer» D. 1 GB
1242.

A user level process in Unix traps the signal sent on a Ctrl + C input and has a signal handling routine that saves appropriate files before terminating the process. When a Ctrl + C input is given to this process, what is the mode in which the signal handling routine executes ?

A. User mode
B. Kernel mode
C. Superuser mode
D. Privileged mode
Answer» C. Superuser mode
1243.

The Unix command used to find out the number of characters in a file is

A. nc
B. wc
C. chcnt
D. lc
Answer» C. chcnt
1244.

Which of the following set of Unix commands will always display “WELCOME” ?

A. export title=WELCOME; Echo $title
B. title = WELCOME; export $ title ; sh –c “echo $title”
C. title = WELCOME; export title ; sh –c “echo $title”
D. title = WELCOME; echo $title
Answer» D. title = WELCOME; echo $title
1245.

Which of the following OS treats hardware as a file system?

A. UNIX
B. DOS
C. Windows NT
D. None of the above
Answer» B. DOS
1246.

An example of a memory management system call in UNIX is:

A. fork
B. mmap
C. sigaction
D. execve
Answer» C. sigaction
1247.

In Linux, the subdirectory that contains system configuration files including user passwords:

A. /boot
B. /usr
C. /etc
D. /proc
Answer» D. /proc
1248.

Which of the following is not an Unix Command ?

A. Whoami
B. wc
C. ls
D. put
Answer» E.
1249.

Which of the following changes permission to deny write permission to group and others?

A. Chmod go-w filex
B. Chmod go w filex
C. Chmod go=w filex
D. None of the above
Answer» B. Chmod go w filex
1250.

The environment variable in Linux, that contain a list of directories the shell automatically recognizes.

A. $PATH
B. $ENV
C. $USER
D. $GREP
Answer» B. $ENV