Explore topic-wise MCQs in UGC-NET.

This section includes 1917 Mcqs, each offering curated multiple-choice questions to sharpen your UGC-NET knowledge and support exam preparation. Choose a topic below to get started.

1801.

A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per minute with each frame carrying an average of 10,000 bits. What is the throughput of this network ?

A. 1 Mbps
B. 2 Mbps
C. 10 Mbps
D. 12 Mbps
Answer» C. 10 Mbps
1802.

In a fast Ethernet cabling, 100 Base-TX uses ........... cable and maximum segment size is ............

A. twisted pair, 100 metres
B. twisted pair, 200 metres
C. fibre optics, 1000 metres
D. fibre optics, 2000 metres
Answer» B. twisted pair, 200 metres
1803.

Which of the following statements is not true with respect to microwaves?

A. Electromagnetic waves with frequencies from 300 GHz to 400 THz.
B. Propagation is line-of-sight.
C. Very high-frequency waves cannot penetrate walls.
D. Use of certain portions of the band requires permission from authorities.
Answer» B. Propagation is line-of-sight.
1804.

The plain text message BAHI encrypted with RSA algorithm using e=3, d=7 and n=33 and the characters of the message are encoded using the values 00 to 25 for letters A to Z. Suppose character by character encryption was implemented. Then, the Cipher Text message is ............

A. ABHI
B. HAQC
C. IHBA
D. BHQC
Answer» C. IHBA
1805.

The throughput of slotted ALOHA is given by:

A. S=G
B. S=Ge^G
C. S=Ge^-G
D. S=e^G
Answer» D. S=e^G
1806.

In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ................

A. 2 bytes
B. 1 byte
C. 4 bytes
D. 5 bytes
Answer» E.
1807.

How much bandwidth is required to send 132 voice-grade channels by FDM on an international satellite system ?

A. 500 MHz
B. 10 MHz
C. 1320 MHz
D. 50 MHz
Answer» B. 10 MHz
1808.

The …………… field is the SNMP PDV reports an error in a response message.

A. error index
B. error status
C. set request
D. agent index
Answer» C. set request
1809.

................. points provide a method to recover data that has been delivered but not yet used.

A. Segmentation
B. Concatenation
C. Translation
D. Synchronization
Answer» E.
1810.

Which of the following is the size of Network bits and Host bits of Class A of IP address?

A. Network bits 7, Host bits 24
B. Network bits 14, Host bits 16
C. Network bits 15, Host bits 16
D. Network bits 16, Host bits 16
Answer» B. Network bits 14, Host bits 16
1811.

Consider the following S1 and S2 :S1 : A hard handover is one in which the channel in the source cell is retained and used for a while in parallel with the channel in the target cell.S2 : A soft handover is one in which the channel in the source cell is retained and only then the channel in the target cell is engaged.

A. S1 is true and S2 is not true
B. S1 is not true and S2 is true
C. Both S1 and S2 are true
D. Both S1 and S2 are not true
Answer» E.
1812.

The ATM cells are ................ bytes long.

A. 48
B. 53
C. 64
D. 69
Answer» C. 64
1813.

For n devices in a network, ____ , number of duplex-mode links are required, for a mesh topology.

A. n(n + 1)
B. n(n - 1)
C. n(n + 1) /2
D. n(n - 1)/2
Answer» D. n(n - 1)/2
1814.

The start and stop bits are used in serial communication for

A. error detection
B. error correction
C. synchronization
D. slowing down the communication
Answer» D. slowing down the communication
1815.

Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers to 'ensure correct re-composition from end to end of the network?'

A. Physical
B. Data-link
C. Transport
D. Application
Answer» D. Application
1816.

Consider the following two statements:S1: TCP handles both congestion and flow controlS2: UDP handles congestion but not flow controlWhich of the following options is correct with respect to the above statements (S1) and (S2)?

A. Neither S1 nor S2 is correct
B. S1 is not correct but S2 is correct
C. S1 is correct but S2 is not correct
D. Both, S1 and S2 are correct
Answer» D. Both, S1 and S2 are correct
1817.

A data file of 1,00,000 characters contains only the characters g-l, with the frequencies as indicated in table. Using the variable-length code by Huffman codes, the file can be encoded with

A. 2,52,000 bits
B. 2,64,000 bits
C. 2,46,000 bits
D. 2,24,000 bits
Answer» E.
1818.

Suppose a file of 10,000 characters is to be sent over a line at 2400 bps. Assume that the data is sent in frames. Each frame consists of 1000 characters and an overhead of 48 bits per frame. Using synchronous transmission, the total overhead time is ..............

A. 0.05 second
B. 0.1 second
C. 0.2 second
D. 2.0 second
Answer» D. 2.0 second
1819.

Which of the following are Data Link Layer standard?1. Ethernet2. HSSI3. Frame Relay4. 10 – Base T5. Token Ring

A. 1, 2, 3
B. 1, 3, 5
C. 1, 3, 4, 5
D. 1, 2, 3, 4, 5
Answer» D. 1, 2, 3, 4, 5
1820.

If a code is t-error correcting, the minimum Hamming distance is equal to:

A. 2t+1
B. 2t
C. 2t-1
D. t-1
Answer» B. 2t
1821.

The dotted-decimal notation of the following IPV4 address in binary notation is ...................10000001 00001011 00001011 11101111

A. 111.56.45.239
B. 129.11.10.238
C. 129.11.11.239
D. 111.56.11.239
Answer» D. 111.56.11.239
1822.

What is the maximum operating rate of a wireless LAN using infrared communication?

A. 1 mbps
B. 2 mbps
C. 5 mbps
D. 11 mbps
Answer» B. 2 mbps
1823.

An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some time without altering the information. This attack is called as ..............

A. Denial of service attack
B. Masquarade attack
C. Simple attack
D. Complex attack
Answer» B. Masquarade attack
1824.

Which of the following IP address class is a multicast address ?

A. Class A
B. Class B
C. Class C
D. Class D
Answer» E.
1825.

The address of a class B host is to be split into subnets with a 6 - bit subnet number. What is the maximum number of subnets and maximum number of hosts in each subnet?

A. 62 subnets and 1022 hosts
B. 64 subnets and 1024 hosts
C. 62 subnets and 254 hosts
D. 64 subnets and 256 hosts
Answer» B. 64 subnets and 1024 hosts
1826.

Which technical concept sets cellular apart from all preceding mobile/radio systems?

A. FM-Transmission
B. Duplex Functionality
C. Frequency Reuse
D. TDMA Technology
Answer» E.
1827.

In substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text.

A. polyalphabetic
B. monoalphabetic
C. transpositional
D. multialphabetic
Answer» C. transpositional
1828.

The cost of the network is usually determined by

A. time complexity
B. switching complexity
C. circuit complexity
D. none of these
Answer» C. circuit complexity
1829.

Using data p=3, q=11, n=pq, d=7  in RSA algorithm find the cipher text of the given plain text SUZANNE

A. BUTAEEZ
B. SUZANNE
C. XYZABCD
D. ABCDXYZ
Answer» B. SUZANNE
1830.

Encryption and decryption are the functions of the ................... layer of OSI model.

A. transport
B. session
C. router
D. presentation
Answer» E.
1831.

In a fully connected mesh network with n devices, there are ................ physical channels to link all devices.

A. n(n–1)/2
B. n(n+1)/2
C. 2n
D. 2n+1
Answer» B. n(n+1)/2
1832.

In which Routing Method do all the routers have a common database?

A. Distance vector
B. Link state
C. Link vector
D. Dijkestra method
Answer» C. Link vector
1833.

Match the following with respect to the Mobile Computing Architecture.a. Downlink control                                      1. 100 Mbpsb. Radio communication data rate              2. Residency latency (RL)c. The average durationof user’s stay in cell                                     3. Sending data from a BS to MDd. FDDI bandwidth                                       4. 2-MbpsCodes : a b c d

A. 2 1 4 3
B. 3 4 2 1
C. 4 1 2 1
D. 4 3 1 2
Answer» C. 4 1 2 1
1834.

Which of the following statements are true?(a) The fragmentation fields in the base header section of IPv4 have moved to the fragmentation extension header in IPv6.(b) The authentication extension header is new in IPv6.(c) The record route option is not implemented in IPv6.

A. (a) and (b) Only
B. (b) and (c) Only
C. (a) and (c) Only
D. (a), (b) and (c)
Answer» E.
1835.

The minimum frame length for 10 Mbps Ethernet is ............. bytes and maximum is ................ bytes.

A. 64 & 128
B. 128 & 1518
C. 1518 & 3036
D. 64 & 1518
Answer» E.
1836.

The IP address ................... is used by hosts when they are being booted.

A. 0.0.0.0
B. 1.0.0.0
C. 1.1.1.1
D. 255.255.255.255
Answer» B. 1.0.0.0
1837.

Match the following Secret Key Algorithms (List I) with Corresponding Key Lengths (List II) and choose the correct answer from the code given below: List I List II(a) Blowfish (i) 128 – 256 bits(b) DES (ii) 128 bits(c) IDEA (iii) 1 - 448 bits(d) RC5 (iv) 56 bits

A. (a)–(iv), (b)-(iii), (c)-(ii) , d-(i)
B. (a)–(iii), (b)-(iv), (c)-(i) , d-(ii)
C. (a)–(iii), (b)-(iv), (c)-(ii) , d-(i)
D. (a)–(ii), (b)-(iii), (c)-(iv) , d-(i)
Answer» D. (a)–(ii), (b)-(iii), (c)-(iv) , d-(i)
1838.

If the data unit is 111111 and the divisor is 1010. In CRC method, what is the dividend at the transmission before division ?

A. 1111110000
B. 1111111010
C. 111111000
D. 111111
Answer» D. 111111
1839.

In hierarchical routing with 4800 routers, what region and cluster sizes should be chosen to minimize the size of the routing table for a three layer hierarchy?

A. 10 clusters, 24 regions and 20 routers
B. 12 clusters, 20 regions and 20 routers
C. 16 clusters, 12 regions and 25 routers
D. 15 clusters, 16 regions and 20 routers
Answer» E.
1840.

The following transportation problem has a solution given below it. The solution of a given transportation problem is

A. infeasible solution
B. optimum solution
C. non-optimum solution
D. unbounded solution
Answer» C. non-optimum solution
1841.

You are given four images represented as follows. The value of entropy is maximum for image

A. I1
B. I2
C. I3
D. I4
Answer» D. I4
1842.

Which of the following can be used for clustering of data ?

A. Single layer perception
B. Multilayer perception
C. Self organizing map
D. Radial basis function
Answer» D. Radial basis function
1843.

Match the following :(i) OLAP                        (a) Regression(ii) OLTP                        (b) Data Warehouse(iii) Decision Tree        (c) RDBMS(iv) Neural Network     (d) Classificationcode:      (i)   (ii)  (iii)   (iv)

A. (b)  (c)  (a)   (d)
B. (b)  (c)  (d)   (a)
C. (c)  (b)  (a)   (d)
D. (c)  (b)  (d)   (a)
Answer» C. (c)  (b)  (a)   (d)
1844.

In Delta Rule for error minimization

A. weights are adjusted w.r.to change in the output
B. weights are adjusted w.r.to difference between desired output and actual output
C. weights are adjusted w.r.to difference between input and output
D. none of the above
Answer» C. weights are adjusted w.r.to difference between input and output
1845.

Consider the following operations to be performed in Unix:“The pipe sorts all files in the current directory modified in the month of “June” by order of size and prints them to the terminal screen. The sort option skips ten fields then sorts the lines in numeric order.”Which of the following Unix command will perform above set of operations?

A. ls – l | grep “June” | sort + 10n
B. ls – l | grep “June” | sort + 10r
C. ls – l | grep – v “June” | sort + 10n
D. ls – l | grep – n “June” | sort + 10x
Answer» B. ls – l | grep “June” | sort + 10r
1846.

Which of the following statement(s) is/are True regarding ‘nice’ command of UNIX?I. It is used to set or change the priority of a process.II. A process’s nice value can be set at the time of creation.III. ‘nice’ takes a command line as an argument.

A. I, II only
B. II, III only
C. I, II, III
D. I, III only
Answer» D. I, III only
1847.

Which of the following information about the UNIX file system is not correct?

A. Super block contains the number of i-nodes, the number of disk blocks, and the start of the list of free disk blocks.
B. An i-node contains accounting information as well as enough information to locate all the disk blocks that holds the file’s data.
C. Each i-node is 256-bytes long
D. All the files and directories are stored in data blocks
Answer» D. All the files and directories are stored in data blocks
1848.

A system call in Linux operating system to create a new child process, which is a copy of the parent process:

A. access
B. fork
C. flock
D. exec
Answer» C. flock
1849.

Which of the following out commands will output "onetwothree"?

A. for val; do echo-n $val; done < one two three
B. for one two three; do echo-n-; done
C. for n in one two three; do echo-n $n; done
D. for n in one two three {echo-n $n}
Answer» D. for n in one two three {echo-n $n}
1850.

Unix command to change the case of first three lines of file “shortlist” from lower to upper

A. $ tr ‘[a-z]’ ‘[A-Z]’ shortlist | head-3
B. $ head-3 shortlist | tr ‘[a-z]’ ‘[A-Z]’
C. $ tr head-3 shortlist ‘[A-Z]’ ‘[a-z]’
D. $ tr shortlist head-3 ‘[a-z]’ ‘[A-Z]’
Answer» C. $ tr head-3 shortlist ‘[A-Z]’ ‘[a-z]’