Explore topic-wise MCQs in UGC-NET.

This section includes 1917 Mcqs, each offering curated multiple-choice questions to sharpen your UGC-NET knowledge and support exam preparation. Choose a topic below to get started.

1751.

A point to point link that supports data flowing in only one direction at a time

A. Simplex link
B. Half Duplex link
C. Full Duplex link
D. Leased Line
Answer» C. Full Duplex link
1752.

Quadrature Amplitude Modulation means changing both:

A. Frequency and phase of the carrier.
B. Frequency and Amplitude of the carrier.
C. Amplitude and phase of the carrier.
D. Amplitude and Wavelength of the carrier.
Answer» D. Amplitude and Wavelength of the carrier.
1753.

A network topology that combines features of linear bus and star topology:

A. Mesh
B. Ring
C. Tree
D. Cube
Answer» D. Cube
1754.

In a typical mobile phone system with hexagonal cells, it is forbidden to reuse a frequency band in adjacent cells. If 840 frequencies are available, how many can be used in a given cell?

A. 280
B. 210
C. 140
D. 120
Answer» B. 210
1755.

What is the function of a translating bridge ?

A. Connect similar remote LANs
B. Connect similar local LANs
C. Connect different types of LANs
D. Translate the network addresses into a layer 2 address
Answer» D. Translate the network addresses into a layer 2 address
1756.

In substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text

A. polyalphabetic
B. mono alphabetic
C. transpositional
D. multialphabetic
Answer» C. transpositional
1757.

Match the following symmetric block ciphers with corresponding block and key sizes:List - I(a) DES(b) IDEA(c) BLOW FISH(d) AESList - II(i) block size 64 and key size ranges between 32 and 448(ii) block size 64 and key size 64(iii) block size 128 and key sizes 128, 192, 256(iv) block size 64 and key size 128Code: (a) (b) (c) (d)

A. (iv) (ii) (i) (iii)
B. (ii) (iv) (i) (iii)
C. (ii) (iv) (iii) (i)
D. (iv) (ii) (iii) (i)
Answer» C. (ii) (iv) (iii) (i)
1758.

Page Shift Keying (PSK) Method is used to modulate digital signal at 9600 bps using 16 level. Find the line signals and speed (i.e. modulation rate).

A. 2400 bauds
B. 1200 bauds
C. 4800 bauds
D. 9600 bauds
Answer» B. 1200 bauds
1759.

CDMA Cell uses …………… carriers of 1.25 MHz.

A. 9
B. 18
C. 22
D. 64
Answer» B. 18
1760.

The mechanism with which several users can share a medium without interference is:

A. Frequency modulation
B. Amplitude modulation
C. Multiplexing
D. None of these
Answer» D. None of these
1761.

What services does the Internet Layer provide?1. Quality of service                2. Routing3. Addressing                           4. Connection-oriented delivery5. Framing bits

A. 1, 2, 3
B. 2, 3, 4
C. 1, 3, 4, 5
D. 2, 3, 4, 5
Answer» B. 2, 3, 4
1762.

Which one of the following is true for asymmetric-key cryptography?

A. Private key is kept by the receiver and public key is announced to the public
B. Public key is kept by the receiver and private key is announced to the public
C. Both private key and public key are kept by the receiver
D. Both private key and public key are announced to the public
Answer» B. Public key is kept by the receiver and private key is announced to the public
1763.

The baud rate of a signal is 600 baud/second. If each signal unit carries 6 bits, then the bit rate of a signal is .................

A. 3600
B. 100
C. 6/600
D. None of the above
Answer» B. 100
1764.

Which interim standard describes inter-switching networking ?

A. IS - 54
B. IS - 95
C. DS - 45
D. ANSI – 41
Answer» C. DS - 45
1765.

Which transport class should be used with residual-error network layer?

A. TP0, TP2
B. TP1, TP3
C. TP1, TP3, TP4
D. TP0, TP1, TP2, TP3, TP4
Answer» C. TP1, TP3, TP4
1766.

Which transport class should be used with a perfect network layer?

A. TP0 and TP2
B. TP1 and TP3
C. TP0, TP1, TP3
D. TP0, TP1, TP2, TP3, TP4
Answer» B. TP1 and TP3
1767.

The .............. measures the relative strengths of two signals or a signal at two different points.

A. frequency
B. attenuation
C. throughput
D. decibel
Answer» E.
1768.

Handoff is the mechanism that

A. transfer an ongoing call from one base station to another
B. initiating a new call
C. dropping an ongoing call
D. none of above
Answer» B. initiating a new call
1769.

In a digital transmission, the receiver clock is 0.1 percent faster than the sender clock. How many extra bits per second does the receiver receive if the data rate is 1 Mbps?

A. 10 bps
B. 100 bps
C. 1000 bps
D. 10000 bps
Answer» D. 10000 bps
1770.

Suppose a digitized voice channel is made by digitizing 8 kHz bandwidth analog voice signal. It is required to sample the signal at twice the highest frequency (two samples per hertz). What is the bit rate required, if it is assumed that each sample requires 8 bits?

A. 32 kbps
B. 64 kbps
C. 128 kbps
D. 256 kbps
Answer» D. 256 kbps
1771.

Ten signals, each requiring 3000 Hz, are multiplexed on to a single channel using FDM. How much minimum bandwidth is required for the multiplexed channel ? Assume that the guard bands are 300 Hz wide.

A. 30,000
B. 32,700
C. 33,000
D. None of the above
Answer» C. 33,000
1772.

Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender?

A. Broadcasting
B. Unicasting
C. Packet switching
D. Circuit switching
Answer» E.
1773.

Match the following cryptographic algorithms with their design issues:List-I                                        List-IIa. DES                              i.  Message Digestb. AES                              ii.  Public Keyc. RSA                              iii. 56-bit keyd. SHA-1                          iv. 128-bit keyCodes:a       b       c       d

A. ii       i       iv       iii
B. iii       i       iv       ii
C. iii       iv       ii       i
D. iv       i       ii       iii
Answer» D. iv       i       ii       iii
1774.

Which of the following control fields in TCP header is used to specify whether the sender has no more data to transmit?

A. FIN
B. RST
C. SYN
D. PSH
Answer» B. RST
1775.

Which are the two modes of IP security?

A. Transport and certificate
B. Transport and tunnel
C. Certificate and tunnel
D. Preshared and transport
Answer» C. Certificate and tunnel
1776.

In a binary Hamming Code the number of check digits is r then number of message digits is equal to :

A. 2^r – 1
B. 2^r – r – 1
C. 2^r – r + 1
D. 2^r + r – 1
Answer» C. 2^r – r + 1
1777.

A message "COMPUTERNETWORK" encrypted (ignore quotes) using columnar transposition cipher with a key "LAYER". The encrypted message is :

A. CTTOEWMROPNRUEK
B. MROUEKCTTPNROEW
C. OEWPNRCTTUEKMRO
D. UEKPNRMROOEWCTT
Answer» D. UEKPNRMROOEWCTT
1778.

Congestion control is done by:

A. Network layer
B. Physical layer
C. Presentation layer
D. None of the above
Answer» E.
1779.

If in an error detection and correction code a message M : “You are good students” is stored as M' : Youare areyou aregood goodare goodstudents studentsgood. What is the space required to store M' in general? (assume that ‘n’ is the length of M)

A. 2n
B. 3n
C. 4n
D. less than 4n
Answer» E.
1780.

In a broadcast network, a layer that is often thin or non-existent is:

A. network layer
B. transport  layer
C. presentation  layer
D. application  layer
Answer» B. transport  layer
1781.

Radio signals generally propagate according to the following mechanisms:

A. Modulation, Amplification, Scattering
B. Reflection, Diffraction, Scattering
C. Amplification, Diffraction, Modulation
D. Reflection, Amplification, Diffraction
Answer» C. Amplification, Diffraction, Modulation
1782.

How much bandwidth is there in 1 micron of spectrum at a wavelength of 1 micron?

A. 300 MHz
B. 3 GHz
C. 300 THz
D. 30 KHz
Answer» D. 30 KHz
1783.

A pure ALOHA Network transmit 200 bit frames using a shared channel with 200 Kbps bandwidth. If the system (all stations put together) produces 500 frames per second, then the throughput of the system is ..............

A. 0.384
B. 0.184
C. 0.286
D. 0.586
Answer» C. 0.286
1784.

Which of the following algorithms is not a broadcast routing algorithm?

A. Flooding
B. Multi-destination routing
C. Reverse path forwarding
D. All of the above
Answer» D. All of the above
1785.

Which layers of the OSI reference model are host-to-host layers ?

A. Transport, Session, Presentation, Application
B. Network, Transport, Session, Presentation
C. Data-link, Network, Transport, Session
D. Physical, Data-link, Network, Transport
Answer» B. Network, Transport, Session, Presentation
1786.

In a classful addressing, first four bits in Class A IP address is

A. 1010
B. 1100
C. 1011
D. 1110
Answer» B. 1100
1787.

Which of the following is/are restriction(s) in classless addressing ?

A. The number of addresses needs to be a power of 2
B. The mask needs to be included in the address to define the block
C. The starting address must be divisible by the number of addresses in the block
D. All of the above
Answer» E.
1788.

Which of the following protocols is used to prevent looping?

A. OSPF
B. Spanning tree
C. SRB
D. Fragment free switching
Answer» C. SRB
1789.

Which of the following routing technique / techniques is / are used in distributed systems?(a) Fixed Routing(b) Virtual Routing(c) Dynamic Routing

A. (a) only
B. (a) and (b) only
C. (c) only
D. All (a), (b), (c)
Answer» E.
1790.

The program used to determine the round-trip delay between a workstation and a destination address is:

A. Tracert
B. Traceroute
C. Ping
D. Pop
Answer» C. Ping
1791.

The maximum payload of a TCP segment is :

A. 65,535
B. 65,515
C. 65,495
D. 65,475
Answer» D. 65,475
1792.

Which of the following substitution technique have the relationship between a character in the plaintext and a character in the ciphertext as one-to-many?

A. Monoalphabetic
B. Polyalphabetic
C. Transpositional
D. None of the above
Answer» C. Transpositional
1793.

An analog signal has a bit rate of 6000 bps and a baud rate of 2000 baud. How many data elements are carried by each signal element?

A. 0.336 bits baud
B. 3 bits baud
C. 120,00,000 bits baud
D. None of the above
Answer» C. 120,00,000 bits baud
1794.

The number of bits that can be transmitted over a network in a certain period of time:

A. Latency
B. Delay
C. Bandwidth
D. Baud
Answer» D. Baud
1795.

A node X on a 10 Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2 Mbps. Token bucket is initially filled with 16 megabits. The maximum duration taken by X to transmit at full rate of 10 Mbps is ............ secs.

A. 1
B. 2
C. 3
D. 4
Answer» C. 3
1796.

In CRC checksum method, assume that given frame for transmission is 1101011011 and the generator polynomial is G(x) = x^4 + x + 1.After implementing CRC encoder, the encoded word sent from sender side is .............

A. 11010110111110
B. 11101101011011
C. 110101111100111
D. 110101111001111
Answer» B. 11101101011011
1797.

Consider the following statements :a. High speed Ethernet works on optic fiber.b. A point to point protocol over Ethernet is a network protocol for encapsulating PPP frames inside Ethernet frames.c. High speed Ethernet does not work on optic fiber.d. A point to point protocol over Ethernet is a network protocol for encapsulating Ethernet frames inside PPP frames.Which of the following is correct ?

A. a and b are true; c and d are false
B. a and b are false; c and d are true
C. a, b, c and d are true
D. a, b, c and d are false
Answer» B. a and b are false; c and d are true
1798.

Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from source to destination and each packet p contains 8000 bits. Total end to end delay in sending packet P is ................

A. 2 sec
B. 3 sec
C. 4 sec
D. 1 sec
Answer» B. 3 sec
1799.

Which of the following protocols is used by email server to maintain a central repository that can be accessed from any machine?

A. POP3
B. IMAP
C. SMTP
D. DMSP
Answer» C. SMTP
1800.

Match the following:List – I                           List – IIa. Session layer           i. Virtual terminal softwareb. Application layer     ii. Semantics of the information transmittedc. Presentation layer   iii. Flow controld. Transport layer         iv. Manage dialogue controlCodes :      a   b   c   d

A. iv   i    ii   iii
B. i    iv   ii   iii
C. iv  i    iii   ii
D. iv  ii    i   iii
Answer» B. i    iv   ii   iii