MCQOPTIONS
Saved Bookmarks
This section includes 1917 Mcqs, each offering curated multiple-choice questions to sharpen your UGC-NET knowledge and support exam preparation. Choose a topic below to get started.
| 1651. |
Hub is a term used with |
| A. | A Star Networks |
| B. | A Ring Networks |
| C. | A Router |
| D. | A Bridge |
| Answer» B. A Ring Networks | |
| 1652. |
The station to hub distance in which it is 2000 metres. |
| A. | 100 Base-Tx |
| B. | 100 Base-Fx |
| C. | 100 Base-T4 |
| D. | 100 Base-T1 |
| Answer» C. 100 Base-T4 | |
| 1653. |
An analog signal has a bit rate of 8000 bps and a baud rate of 1000.Then analog signal has .............. signal elements and carry ............ data elements in each signal. |
| A. | 256, 8 bits |
| B. | 128, 4 bits |
| C. | 256, 4 bits |
| D. | 128, 8 bits |
| Answer» B. 128, 4 bits | |
| 1654. |
Encrypt the plain text Message “EXTRANET” using Transposition cipher technique with the following key. Using ‘Z’ as bogus character. |
| A. | TAXERTZENZ |
| B. | EXTRANETZZ |
| C. | EZXZTRZANZET |
| D. | EXTZRANZETZ |
| Answer» B. EXTRANETZZ | |
| 1655. |
A slotted ALOHA network transmits 200 bits frames using a shared channel with 200 kbps bandwidth. If the system (all stations put together) produces 1000 frames per second, then the throughput of the system is ................. |
| A. | 0.268 |
| B. | 0.468 |
| C. | 0.368 |
| D. | 0.568 |
| Answer» D. 0.568 | |
| 1656. |
Match the following:(a) Line coding (i) A technique to change analog signal to digital data.(b) Block coding (ii) Provides synchronization without increasingnumber of bits(c) Scrambling (iii) Process of converting digital data to digital signal.(d) Pulse code modulation (iv) Provides redundancy to ensure synchronizationand inherits error detection.Codes: (a) (b) (c) (d) |
| A. | (iv) (iii) (ii) (i) |
| B. | (iii) (iv) (ii) (i) |
| C. | (i) (iii) (ii) (iv) |
| D. | (ii) (i) (iv) (iii) |
| Answer» C. (i) (iii) (ii) (iv) | |
| 1657. |
Given the following statements:(a) Frequency Division Multiplexing is a technique that can be applied when the bandwidth of a link is greater than combined bandwidth of signals to be transmitted.(b) Wavelength Division Multiplexing (WDM) is an analog multiplexing Technique to combine optical signals.(c) WDM is a Digital Multiplexing Technique.(d) TDM is a Digital Multiplexing Technique.Which of the following is correct? |
| A. | (a), (b), (c) and (d) are true |
| B. | (a), (b), (c) and (d) are false |
| C. | (a), (b) and (d) are false; (c) is true |
| D. | (a), (b) and (d) are true; (c) is false |
| Answer» E. | |
| 1658. |
Suppose that the time to do a null remote procedure call (RPC) (i.e, 0 data bytes) is 1.0 msec, with an additional 1.5 msec for every 1K of data. How long does it take to read 32 K from the file server as 32 1K RPCs? |
| A. | 49 msec |
| B. | 80 msec |
| C. | 48 msec |
| D. | 100 msec |
| Answer» C. 48 msec | |
| 1659. |
Another name of IEEE 802.11a is: |
| A. | WECA |
| B. | Fast Ethernet |
| C. | Wi-Fi 5 |
| D. | 802.11g |
| Answer» D. 802.11g | |
| 1660. |
An Internet Service Provider (ISP) has following chunk of CIDR-based IP addresses available with it :245.248.128.9./20. The ISP wants to give half of this chunk of addresses to organization A and a quarter to organization B while retaining the remaining with itself. Which of the following is a valid allocation of addresses to A and B? |
| A. | 245.248.136.0/21 and 245.248.128.0/22 |
| B. | 245.248.128.0/21 and 245.248.128.0/22 |
| C. | 245.248.132.0/22 and 245.248.132.0/21 |
| D. | 245.248.136.0/24 and 245.248.132.0/21 |
| Answer» B. 245.248.128.0/21 and 245.248.128.0/22 | |
| 1661. |
How many DS1 signals are transported on a DS3 signal ? |
| A. | 24 |
| B. | 672 |
| C. | 14 |
| D. | 28 |
| Answer» E. | |
| 1662. |
The number of bits required for an IPV6 address is |
| A. | 16 |
| B. | 32 |
| C. | 64 |
| D. | 128 |
| Answer» E. | |
| 1663. |
To guarantee correction of upto t errors, the minimum Hamming distance dmin in a block code must be ................ |
| A. | t+1 |
| B. | t−2 |
| C. | 2t−1 |
| D. | 2t+1 |
| Answer» E. | |
| 1664. |
In a classful addressing, the IP addresses with 0 (zero) as network number: |
| A. | refers to the current network |
| B. | refers to broadcast on the local network |
| C. | refers to broadcast on a distant network |
| D. | refers to loopback testing |
| Answer» B. refers to broadcast on the local network | |
| 1665. |
If user A wants to send an encrypted message to user B. The plain text of A is encrypted with the ................. |
| A. | Public Key of user A |
| B. | Public Key of user B |
| C. | Private Key of user A |
| D. | Private Key of user B |
| Answer» C. Private Key of user A | |
| 1666. |
X.25 protocol consists of: |
| A. | Physical and Frame levels |
| B. | Frame and Packet levels |
| C. | Physical, Frame and Packet levels |
| D. | None of the above |
| Answer» D. None of the above | |
| 1667. |
The cellular frequency reuse factor for the cluster size N is |
| A. | N |
| B. | N^2 |
| C. | 1/N |
| D. | 1/N^2 |
| Answer» D. 1/N^2 | |
| 1668. |
Which of the following field of the TCP header tells how many bytes may be sent starting at the byte acknowledged ? |
| A. | TCP header length |
| B. | Window size |
| C. | Acknowledgement number |
| D. | Urgent pointer |
| Answer» C. Acknowledgement number | |
| 1669. |
Theoretically, how many 1.25 MHz Carriers are there in a CDMA cell ? |
| A. | 18 |
| B. | 22 |
| C. | 9 |
| D. | 64 |
| Answer» D. 64 | |
| 1670. |
Decrypt the message “WTAAD” using the Caesar Cipher with key=15. |
| A. | LIPPS |
| B. | HELLO |
| C. | OLLEH |
| D. | DAATW |
| Answer» C. OLLEH | |
| 1671. |
Match the following:List – I List - IIa. Physical Layer i. Allow resources to network accessb. Datalink Layer ii. Move packets from one destination to otherc. Network Layer iii. Process to process message deliveryd. Transport Layer iv. Transmission of bit streame. Application Layer v. Formation of framesCodes: a b c d e |
| A. | iv v ii iii i |
| B. | v iv i ii iii |
| C. | i iii ii v iv |
| D. | i ii iv iii v |
| Answer» B. v iv i ii iii | |
| 1672. |
The single stage network is also called |
| A. | one sided network |
| B. | two sided network |
| C. | recirculating network |
| D. | pipeline network |
| Answer» D. pipeline network | |
| 1673. |
Suppose we want to download text documents at the rate of 100 pages per second. Assume that a page consists of an average of 24 lines with 80 characters in each line. What is the required bit rate of the channel? |
| A. | 192 kbps |
| B. | 512 kbps |
| C. | 1.248 Mbps |
| D. | 1.536 Mbps |
| Answer» E. | |
| 1674. |
A file is downloaded in a home computer using a 56 kbps MODEM connected to an Internet Service Provider. If the download of file completes in 2 minutes, what is the maximum size of data downloaded? |
| A. | 112 Mbits |
| B. | 6.72 Mbits |
| C. | 67.20 Mbits |
| D. | 672 Mbits |
| Answer» C. 67.20 Mbits | |
| 1675. |
A network with bandwidth of 10 Mbps can pass only an average of 15,000 frames per minute with each frame carrying an average of 8,000 bits. What is the throughput of this network ? |
| A. | 2 Mbps |
| B. | 60 Mbps |
| C. | 120 Mbps |
| D. | 10 Mbps |
| Answer» B. 60 Mbps | |
| 1676. |
Match the following : List - I List - IIa. Call control protocol i. Interface between Base Transceiver Station (BTS) and Base Station Controller (BSC)b. A-bis ii. Spread spectrumc. BSMAP iii. Connection managementd. CDMA iv. Works between Mobile Switching Centre (MSC) and Base Station Subsystem (BSS)Code:a b c d |
| A. | iii iv i ii |
| B. | iii i iv ii |
| C. | i ii iii iv |
| D. | iv iii ii i |
| Answer» E. | |
| 1677. |
A client-server system uses a satellite network, With the satellite at a height of 40,000 kms. What is the best-case delay in response to a request (Note that the speed of light in air is 3,00,000 km/second). |
| A. | 133.33 m sec |
| B. | 266.67 m sec |
| C. | 400.00 m sec |
| D. | 533.33 m sec |
| Answer» C. 400.00 m sec | |
| 1678. |
The message 11001001 is to be transmitted using the CRC polynomial x3 +1 to protect it from errors. The message that should be transmitted is : |
| A. | 110010011001 |
| B. | 11001001 |
| C. | 110010011001001 |
| D. | 11001001011 |
| Answer» E. | |
| 1679. |
In IPV 4, the IP address 200.200.200.200 belongs to |
| A. | Class A |
| B. | Class B |
| C. | Class C |
| D. | Class D |
| Answer» D. Class D | |
| 1680. |
How many distinct stages are there in DES algorithm, which is parameterized by a 56-bit key? |
| A. | 16 |
| B. | 17 |
| C. | 18 |
| D. | 19 |
| Answer» B. 17 | |
| 1681. |
How many characters per second (7 bits + 1 parity) can be transmitted over a 3200 bps line if the transfer is asynchronous? (Assuming 1 start bit and 1 stop bit) |
| A. | 300 |
| B. | 320 |
| C. | 360 |
| D. | 400 |
| Answer» C. 360 | |
| 1682. |
Which of the following is not a field in TCP header ? |
| A. | Sequence number |
| B. | Fragment offSet |
| C. | Checksum |
| D. | Window size |
| Answer» C. Checksum | |
| 1683. |
_________________ is a bit-oriented protocol for communication over point-to-point and multi-point links . |
| A. | Stop-and-wait |
| B. | HDLC |
| C. | Sliding window |
| D. | Go-back-N |
| Answer» B. HDLC | |
| 1684. |
If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is ........................ |
| A. | 1 kbps |
| B. | 1.25 kbps |
| C. | 2 kbps |
| D. | 10 kbps |
| Answer» E. | |
| 1685. |
Assertion (A): Twisted pairs are widely used as transmission medium.Reasoning (R): Twisted pairs have adequate performance and low cost. |
| A. | Both (A) and (R) are true and (R) is the correct explanation for (A) |
| B. | Both (A) and (R) are true but (R) is not the correct explanation |
| C. | (A) is true but (R) is false |
| D. | (A) is false but (R) is true |
| Answer» B. Both (A) and (R) are true but (R) is not the correct explanation | |
| 1686. |
Match the following:List - I(a) Data link layer(b) Network layer(c) Transport layer(d) Presentation layerList - II(i) Encryption(ii) Connection control(iii) Routing(iv) FramingCode : (a) (b) (c) (d) |
| A. | (iv) (iii) (i) (ii) |
| B. | (iii) (iv) (ii) (i) |
| C. | (iv) (ii) (iii) (i) |
| D. | (iv) (iii) (ii) (i) |
| Answer» E. | |
| 1687. |
Using p=3, q=13, d=7 and e=3 in the RSA algorithm, what is the value of ciphertext for a plain text 5? |
| A. | 13 |
| B. | 21 |
| C. | 26 |
| D. | 8 |
| Answer» E. | |
| 1688. |
Assume that we need to download text documents at the rate of 100 pages per minute. A page is an average of 24 lines with 80 characters in each line and each character requires 8 bits. Then the required bit rate of the channel is ................ |
| A. | 1.636 Kbps |
| B. | 1.636 Mbps |
| C. | 2.272 Mbps |
| D. | None of the above |
| Answer» E. | |
| 1689. |
The subnet mask 255.255.255.192 |
| A. | Extends the network portion to 16 bits |
| B. | Extends the network portion to 26 bits |
| C. | Extends the network portion to 36 bits |
| D. | Has no effect on the network portion of an IP address |
| Answer» C. Extends the network portion to 36 bits | |
| 1690. |
What is the propagation time if the distance between the two points is 48,900 ? Assume the propagation speed to be 2.4 x 108 meter/second in cable. |
| A. | 0.5 ms |
| B. | 20 ms |
| C. | 50 ms |
| D. | 200 ms |
| Answer» E. | |
| 1691. |
Identify the incorrect statement: |
| A. | The ATM adaptation layer is not service dependent. |
| B. | Logical connections in ATM are referred to as virtual channel connections. |
| C. | ATM is a streamlined protocol with minimal error and flow control capabilities. |
| D. | ATM is also known as cell relay. |
| Answer» B. Logical connections in ATM are referred to as virtual channel connections. | |
| 1692. |
A 10 BASE-2 network is limited to: |
| A. | 20 bytes per data field |
| B. | 30 stations per segment |
| C. | 40 segments |
| D. | 50 feet of cable |
| Answer» C. 40 segments | |
| 1693. |
A high performance switching and multiplexing technology that utilizes fixed length packets to carry different types of traffic is: |
| A. | ATM |
| B. | ADSL |
| C. | SONET |
| D. | None of the above |
| Answer» B. ADSL | |
| 1694. |
Which technology is sometime referred to as wireless cable? |
| A. | MMDS wireless cable |
| B. | ATM |
| C. | LMDS |
| D. | CDMA |
| Answer» B. ATM | |
| 1695. |
Encryption and Decryption is the responsibility of ___ Layer. |
| A. | Physical |
| B. | Network |
| C. | Application |
| D. | Datalink |
| Answer» D. Datalink | |
| 1696. |
The frequency reuse plan is divided into cell grouping using how many cells, where the number of cells equals N ? |
| A. | 3 |
| B. | 10 |
| C. | 7 |
| D. | 21 |
| Answer» E. | |
| 1697. |
A software agent is defined asI. A software developed for accomplishing a given task.II. A computer program which is capable of acting on behalf of the user in order to accomplish a given computational task.III. An open source software for accomplishing a given task. |
| A. | I |
| B. | II |
| C. | III |
| D. | All of the above |
| Answer» C. III | |
| 1698. |
When data and acknowledgement are sent in the same frame, this is called as |
| A. | Piggy packing |
| B. | Piggy backing |
| C. | Back packing |
| D. | Good packing |
| Answer» C. Back packing | |
| 1699. |
An analog signal carries 4 bits in each signal unit. If 1000 signal units are sent per second, then baud rate and bit rate of the signal are ________ and ____________ |
| A. | 4000 bauds \ sec & 1000 bps |
| B. | 2000 bauds \ sec & 1000 bps |
| C. | 1000 bauds \ sec & 500 bps |
| D. | 1000 bauds \ sec & 4000 bps |
| Answer» E. | |
| 1700. |
Using the RSA public key crypto system, if p = 13, q = 31 and d = 7, then the value of e is |
| A. | 101 |
| B. | 105 |
| C. | 103 |
| D. | 107 |
| Answer» D. 107 | |