

MCQOPTIONS
Saved Bookmarks
This section includes 1917 Mcqs, each offering curated multiple-choice questions to sharpen your UGC-NET knowledge and support exam preparation. Choose a topic below to get started.
1751. |
A point to point link that supports data flowing in only one direction at a time |
A. | Simplex link |
B. | Half Duplex link |
C. | Full Duplex link |
D. | Leased Line |
Answer» C. Full Duplex link | |
1752. |
Quadrature Amplitude Modulation means changing both: |
A. | Frequency and phase of the carrier. |
B. | Frequency and Amplitude of the carrier. |
C. | Amplitude and phase of the carrier. |
D. | Amplitude and Wavelength of the carrier. |
Answer» D. Amplitude and Wavelength of the carrier. | |
1753. |
A network topology that combines features of linear bus and star topology: |
A. | Mesh |
B. | Ring |
C. | Tree |
D. | Cube |
Answer» D. Cube | |
1754. |
In a typical mobile phone system with hexagonal cells, it is forbidden to reuse a frequency band in adjacent cells. If 840 frequencies are available, how many can be used in a given cell? |
A. | 280 |
B. | 210 |
C. | 140 |
D. | 120 |
Answer» B. 210 | |
1755. |
What is the function of a translating bridge ? |
A. | Connect similar remote LANs |
B. | Connect similar local LANs |
C. | Connect different types of LANs |
D. | Translate the network addresses into a layer 2 address |
Answer» D. Translate the network addresses into a layer 2 address | |
1756. |
In substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text |
A. | polyalphabetic |
B. | mono alphabetic |
C. | transpositional |
D. | multialphabetic |
Answer» C. transpositional | |
1757. |
Match the following symmetric block ciphers with corresponding block and key sizes:List - I(a) DES(b) IDEA(c) BLOW FISH(d) AESList - II(i) block size 64 and key size ranges between 32 and 448(ii) block size 64 and key size 64(iii) block size 128 and key sizes 128, 192, 256(iv) block size 64 and key size 128Code: (a) (b) (c) (d) |
A. | (iv) (ii) (i) (iii) |
B. | (ii) (iv) (i) (iii) |
C. | (ii) (iv) (iii) (i) |
D. | (iv) (ii) (iii) (i) |
Answer» C. (ii) (iv) (iii) (i) | |
1758. |
Page Shift Keying (PSK) Method is used to modulate digital signal at 9600 bps using 16 level. Find the line signals and speed (i.e. modulation rate). |
A. | 2400 bauds |
B. | 1200 bauds |
C. | 4800 bauds |
D. | 9600 bauds |
Answer» B. 1200 bauds | |
1759. |
CDMA Cell uses …………… carriers of 1.25 MHz. |
A. | 9 |
B. | 18 |
C. | 22 |
D. | 64 |
Answer» B. 18 | |
1760. |
The mechanism with which several users can share a medium without interference is: |
A. | Frequency modulation |
B. | Amplitude modulation |
C. | Multiplexing |
D. | None of these |
Answer» D. None of these | |
1761. |
What services does the Internet Layer provide?1. Quality of service 2. Routing3. Addressing 4. Connection-oriented delivery5. Framing bits |
A. | 1, 2, 3 |
B. | 2, 3, 4 |
C. | 1, 3, 4, 5 |
D. | 2, 3, 4, 5 |
Answer» B. 2, 3, 4 | |
1762. |
Which one of the following is true for asymmetric-key cryptography? |
A. | Private key is kept by the receiver and public key is announced to the public |
B. | Public key is kept by the receiver and private key is announced to the public |
C. | Both private key and public key are kept by the receiver |
D. | Both private key and public key are announced to the public |
Answer» B. Public key is kept by the receiver and private key is announced to the public | |
1763. |
The baud rate of a signal is 600 baud/second. If each signal unit carries 6 bits, then the bit rate of a signal is ................. |
A. | 3600 |
B. | 100 |
C. | 6/600 |
D. | None of the above |
Answer» B. 100 | |
1764. |
Which interim standard describes inter-switching networking ? |
A. | IS - 54 |
B. | IS - 95 |
C. | DS - 45 |
D. | ANSI – 41 |
Answer» C. DS - 45 | |
1765. |
Which transport class should be used with residual-error network layer? |
A. | TP0, TP2 |
B. | TP1, TP3 |
C. | TP1, TP3, TP4 |
D. | TP0, TP1, TP2, TP3, TP4 |
Answer» C. TP1, TP3, TP4 | |
1766. |
Which transport class should be used with a perfect network layer? |
A. | TP0 and TP2 |
B. | TP1 and TP3 |
C. | TP0, TP1, TP3 |
D. | TP0, TP1, TP2, TP3, TP4 |
Answer» B. TP1 and TP3 | |
1767. |
The .............. measures the relative strengths of two signals or a signal at two different points. |
A. | frequency |
B. | attenuation |
C. | throughput |
D. | decibel |
Answer» E. | |
1768. |
Handoff is the mechanism that |
A. | transfer an ongoing call from one base station to another |
B. | initiating a new call |
C. | dropping an ongoing call |
D. | none of above |
Answer» B. initiating a new call | |
1769. |
In a digital transmission, the receiver clock is 0.1 percent faster than the sender clock. How many extra bits per second does the receiver receive if the data rate is 1 Mbps? |
A. | 10 bps |
B. | 100 bps |
C. | 1000 bps |
D. | 10000 bps |
Answer» D. 10000 bps | |
1770. |
Suppose a digitized voice channel is made by digitizing 8 kHz bandwidth analog voice signal. It is required to sample the signal at twice the highest frequency (two samples per hertz). What is the bit rate required, if it is assumed that each sample requires 8 bits? |
A. | 32 kbps |
B. | 64 kbps |
C. | 128 kbps |
D. | 256 kbps |
Answer» D. 256 kbps | |
1771. |
Ten signals, each requiring 3000 Hz, are multiplexed on to a single channel using FDM. How much minimum bandwidth is required for the multiplexed channel ? Assume that the guard bands are 300 Hz wide. |
A. | 30,000 |
B. | 32,700 |
C. | 33,000 |
D. | None of the above |
Answer» C. 33,000 | |
1772. |
Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender? |
A. | Broadcasting |
B. | Unicasting |
C. | Packet switching |
D. | Circuit switching |
Answer» E. | |
1773. |
Match the following cryptographic algorithms with their design issues:List-I List-IIa. DES i. Message Digestb. AES ii. Public Keyc. RSA iii. 56-bit keyd. SHA-1 iv. 128-bit keyCodes:a b c d |
A. | ii i iv iii |
B. | iii i iv ii |
C. | iii iv ii i |
D. | iv i ii iii |
Answer» D. iv i ii iii | |
1774. |
Which of the following control fields in TCP header is used to specify whether the sender has no more data to transmit? |
A. | FIN |
B. | RST |
C. | SYN |
D. | PSH |
Answer» B. RST | |
1775. |
Which are the two modes of IP security? |
A. | Transport and certificate |
B. | Transport and tunnel |
C. | Certificate and tunnel |
D. | Preshared and transport |
Answer» C. Certificate and tunnel | |
1776. |
In a binary Hamming Code the number of check digits is r then number of message digits is equal to : |
A. | 2^r – 1 |
B. | 2^r – r – 1 |
C. | 2^r – r + 1 |
D. | 2^r + r – 1 |
Answer» C. 2^r – r + 1 | |
1777. |
A message "COMPUTERNETWORK" encrypted (ignore quotes) using columnar transposition cipher with a key "LAYER". The encrypted message is : |
A. | CTTOEWMROPNRUEK |
B. | MROUEKCTTPNROEW |
C. | OEWPNRCTTUEKMRO |
D. | UEKPNRMROOEWCTT |
Answer» D. UEKPNRMROOEWCTT | |
1778. |
Congestion control is done by: |
A. | Network layer |
B. | Physical layer |
C. | Presentation layer |
D. | None of the above |
Answer» E. | |
1779. |
If in an error detection and correction code a message M : “You are good students” is stored as M' : Youare areyou aregood goodare goodstudents studentsgood. What is the space required to store M' in general? (assume that ‘n’ is the length of M) |
A. | 2n |
B. | 3n |
C. | 4n |
D. | less than 4n |
Answer» E. | |
1780. |
In a broadcast network, a layer that is often thin or non-existent is: |
A. | network layer |
B. | transport layer |
C. | presentation layer |
D. | application layer |
Answer» B. transport layer | |
1781. |
Radio signals generally propagate according to the following mechanisms: |
A. | Modulation, Amplification, Scattering |
B. | Reflection, Diffraction, Scattering |
C. | Amplification, Diffraction, Modulation |
D. | Reflection, Amplification, Diffraction |
Answer» C. Amplification, Diffraction, Modulation | |
1782. |
How much bandwidth is there in 1 micron of spectrum at a wavelength of 1 micron? |
A. | 300 MHz |
B. | 3 GHz |
C. | 300 THz |
D. | 30 KHz |
Answer» D. 30 KHz | |
1783. |
A pure ALOHA Network transmit 200 bit frames using a shared channel with 200 Kbps bandwidth. If the system (all stations put together) produces 500 frames per second, then the throughput of the system is .............. |
A. | 0.384 |
B. | 0.184 |
C. | 0.286 |
D. | 0.586 |
Answer» C. 0.286 | |
1784. |
Which of the following algorithms is not a broadcast routing algorithm? |
A. | Flooding |
B. | Multi-destination routing |
C. | Reverse path forwarding |
D. | All of the above |
Answer» D. All of the above | |
1785. |
Which layers of the OSI reference model are host-to-host layers ? |
A. | Transport, Session, Presentation, Application |
B. | Network, Transport, Session, Presentation |
C. | Data-link, Network, Transport, Session |
D. | Physical, Data-link, Network, Transport |
Answer» B. Network, Transport, Session, Presentation | |
1786. |
In a classful addressing, first four bits in Class A IP address is |
A. | 1010 |
B. | 1100 |
C. | 1011 |
D. | 1110 |
Answer» B. 1100 | |
1787. |
Which of the following is/are restriction(s) in classless addressing ? |
A. | The number of addresses needs to be a power of 2 |
B. | The mask needs to be included in the address to define the block |
C. | The starting address must be divisible by the number of addresses in the block |
D. | All of the above |
Answer» E. | |
1788. |
Which of the following protocols is used to prevent looping? |
A. | OSPF |
B. | Spanning tree |
C. | SRB |
D. | Fragment free switching |
Answer» C. SRB | |
1789. |
Which of the following routing technique / techniques is / are used in distributed systems?(a) Fixed Routing(b) Virtual Routing(c) Dynamic Routing |
A. | (a) only |
B. | (a) and (b) only |
C. | (c) only |
D. | All (a), (b), (c) |
Answer» E. | |
1790. |
The program used to determine the round-trip delay between a workstation and a destination address is: |
A. | Tracert |
B. | Traceroute |
C. | Ping |
D. | Pop |
Answer» C. Ping | |
1791. |
The maximum payload of a TCP segment is : |
A. | 65,535 |
B. | 65,515 |
C. | 65,495 |
D. | 65,475 |
Answer» D. 65,475 | |
1792. |
Which of the following substitution technique have the relationship between a character in the plaintext and a character in the ciphertext as one-to-many? |
A. | Monoalphabetic |
B. | Polyalphabetic |
C. | Transpositional |
D. | None of the above |
Answer» C. Transpositional | |
1793. |
An analog signal has a bit rate of 6000 bps and a baud rate of 2000 baud. How many data elements are carried by each signal element? |
A. | 0.336 bits baud |
B. | 3 bits baud |
C. | 120,00,000 bits baud |
D. | None of the above |
Answer» C. 120,00,000 bits baud | |
1794. |
The number of bits that can be transmitted over a network in a certain period of time: |
A. | Latency |
B. | Delay |
C. | Bandwidth |
D. | Baud |
Answer» D. Baud | |
1795. |
A node X on a 10 Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2 Mbps. Token bucket is initially filled with 16 megabits. The maximum duration taken by X to transmit at full rate of 10 Mbps is ............ secs. |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» C. 3 | |
1796. |
In CRC checksum method, assume that given frame for transmission is 1101011011 and the generator polynomial is G(x) = x^4 + x + 1.After implementing CRC encoder, the encoded word sent from sender side is ............. |
A. | 11010110111110 |
B. | 11101101011011 |
C. | 110101111100111 |
D. | 110101111001111 |
Answer» B. 11101101011011 | |
1797. |
Consider the following statements :a. High speed Ethernet works on optic fiber.b. A point to point protocol over Ethernet is a network protocol for encapsulating PPP frames inside Ethernet frames.c. High speed Ethernet does not work on optic fiber.d. A point to point protocol over Ethernet is a network protocol for encapsulating Ethernet frames inside PPP frames.Which of the following is correct ? |
A. | a and b are true; c and d are false |
B. | a and b are false; c and d are true |
C. | a, b, c and d are true |
D. | a, b, c and d are false |
Answer» B. a and b are false; c and d are true | |
1798. |
Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from source to destination and each packet p contains 8000 bits. Total end to end delay in sending packet P is ................ |
A. | 2 sec |
B. | 3 sec |
C. | 4 sec |
D. | 1 sec |
Answer» B. 3 sec | |
1799. |
Which of the following protocols is used by email server to maintain a central repository that can be accessed from any machine? |
A. | POP3 |
B. | IMAP |
C. | SMTP |
D. | DMSP |
Answer» C. SMTP | |
1800. |
Match the following:List – I List – IIa. Session layer i. Virtual terminal softwareb. Application layer ii. Semantics of the information transmittedc. Presentation layer iii. Flow controld. Transport layer iv. Manage dialogue controlCodes : a b c d |
A. | iv i ii iii |
B. | i iv ii iii |
C. | iv i iii ii |
D. | iv ii i iii |
Answer» B. i iv ii iii | |