Learn & Grow


Advanced Computer Network Questions & Answers with explanation

Welcome to our blog on Advanced Computer Network, where we explore some of the most common questions and answers in the field. Whether you are a seasoned developer, a curious student, or simply someone interested in the latest trends in technology. This blog is designed to help you expand your knowledge and stay up to date with the latest advancements in computer science. You can also watch our Training videos in our YouTube Channel EasyWay2Learn. Where you can find tutorial based on Robotic Process Automation.

Post Contents

Q1. Which of these is not used by intranet?

    a. IP
    b. TCP
    c. BSNL
    d. HTTP

    Correct Answer is c (BSNL)

    Explanation: Intranet is a company’s internal web and uses TCP/IP, HTTP and other internet protocols. Its main object is to share company information among employees

    Q2. In segment header, sequence number and acknowledgement number fields refer to_____

    a. Segment Number
    b. Byte Number
    c. Acknowledgment
    d. Buffer Number

    Correct Answer is b (Byte Number)

    Explanation: TCP must ensure ordered delivery of packets. Sequence number and acknowledgement number are used to identify the byte number of the packet.

    Q3. Which of the following routing algorithms can be used for network layer design?

    a. All of These
    b. Distance Vector Routing
    c. Link State Routing
    d. Shortest Path Algorithm

    Correct Answer is a (All of These)

    Explanation: The routing algorithm is what decides where a packet should go next. There are several routing techniques like shortest path algorithm, static and dynamic routing, decentralized routing, distance vector routing, link state routing, Hierarchical routing etc.

    Q4. HTML is used to create.

    a. High Level Program
    b. Machine Language Program
    c. Web Page
    d. Web Server

    Correct Answer is c (Web Page)

    Explanation: HTML is Hyper Text Markup Language that use for creating Web pages

    Q5. Networks of interconnected, battery-powered, wireless sensors placed in the physical Environment.

    a. Mesh
    b. PAN
    C. WLAN
    d. WSN

    Correct Answer is d (WSN)

    Explanation: WSNs are networks of hundreds of interconnected wireless devices that are embedded into the physical environment to provide measurement of many points over large spaces

    Q6. What is the full form of WLAN?

    a. Wireless Local Area Node
    b. Wide Local Area Network
    c. Wireless Land Access Network
    d. Wireless Local Area Network

    Correct Answer is d (Wireless Local Area Network)

    Q7. _______Router user queries or command to appropriate the nodes in a sensor network.

    a. All of these
    b. Bridge
    c. Gateway
    d. None of these

    Correct Answer is c (Gateway)

    Q8. Intranet is a company’s internal web.

    a. TRUE
    b. FALSE

    Correct Answer is a (True)

    Q9. The File Transfer Protocol is built on_____________

    a. Connection Oriented Architecture
    b. Service Oriented Architecture
    c. Client Server Architecture
    d. Data Centric Architecture

    Correct Answer is c (Client Server Architecture)

    Explanation: File Transfer Protocol (FTP) is built on a client–server model architecture. which uses separate control and data connections between the client and the server

    Q10. In File Transfer Protocol, data transfer cannot be done in__________

    a. Block mode
    b. Compressed mode
    c. Message mode
    d. Stream mode

    Correct Answer is c (Message mode)

    Explanation: In FTP, the Data transfer cannot be done in message mode

    Q11. An antenna connecting a mobile device to a wired local area network.

    a. Wireless Access Point
    b. Wireless
    c. Mobile Commerce
    d. Wi-Fi

    Correct Answer is a (Wireless Access Point)

    Q12. A _____ is a TCP name for a transport service access point.

    a. Node
    b. Protocol
    c. Port
    d. Pipe

    Correct Answer is c (Port)

    Explanation: A Port facilitates the packet transmission to the destination from the source

    Q13. The _____ field is used to detect errors over the entire user datagram.

    a. Checksum
    b. Udp Header
    c. Destination Port
    d. Source Port

    Correct Answer is a (Checksum)

    Explanation: The Checksum field is used to detect errors over the entire user datagram

    Q14. Which address is used to identify a process on a host by the transport layer?

    a. Physical Address and Logical Address
    b. Port Address
    c. Specific Address
    d. All of the Mentioned

    Correct Answer is b (Port Address)

    Explanation: Port number is use to identify a specific process in which a network message is to be forwarded when it arrives at a server

    Q15. Connection establishment in TCP is done by which mechanism?

    a. Three-Way Handshaking
    b. Flow Control
    c. Forwarding
    d. Synchronization

    Correct Answer is a (Three-Way Handshaking)

    Explanation: Transmission Control Protocol (TCP) uses a three-way handshake to establish a reliable connection and the connection is full duplex, and both sides synchronize and acknowledge each other

    16. Which one of the following is a version of UDP with congestion control

    a. User Congestion Control Protocol
    b. Datagram Congestion Control Protocol
    c. Structured Stream Transport
    d. Stream Control Transmission Protocol

    Correct Answer is (Datagram Congestion Control Protocol)

    Explanation: Datagram congestion control protocol is a congestion-controlled version of UDP

    Q17. In wireless ad-hoc network (WANET)__

    a. Nodes are not required.
    b. Access point is not required.
    c. All nodes are access points.
    d. Access point is must.

    Correct Answer is b (Access point is not required)


    Q18. Transport layer protocols deals with__________

    a. Process To Process Communication
    b. Man To Man Communication
    c. Node To Node Communication
    d. Application To Application Communication

    Correct Answer is a (Process To Process Communication)

    Explanation: Transport layer is 4th layer in TCP/IP model and OSI reference model. Transport layer deals with logical communication between process and responsible for delivering a message between network host.

    Q19. Which of the Following are the challenges in mobile computing?

    a. Low Power and resources
    b. High band width
    c. Security risk
    d. All of these

    Correct Answer is d (All of these)


    Q20. Which layer is used to link the network support layers and user support layers?

    a. Session Layer
    b. Application Layer
    c. Transport Layer
    d. Link Layer

    Correct Answer is c (Transport Layer)

    Explanation: Physical, data link and network layers are network support layers. Session, presentation and application layers are user support layers. The transport layer links these layers by segmenting and rearranging the data

    Q21. A wireless network interface controller can work in______

    a. both infrastructure mode and ad-hoc mode
    b. WDS mode
    c. infrastructure mode
    d. ad-hoc mode

    Correct Answer is a (both infrastructure mode and ad-hoc mode)

    Explanation: A wireless network interface controller can work in both infrastructure mode and ad-hoc mode

    Q22. Header of a frame generally contains_____________

    a. Synchronization Bytes
    b. All of These
    c. Frame Identifier
    d. Addresses

    Correct Answer is d (Addresses)

    Explanation: The header of a frame generally contains addresses

    Q23. In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ______

    a. Session Layer
    b. Link Layer
    c. Transport Layer
    d. Application Layer

    Correct Answer is d (Application Layer)

    Explanation: In TCP/IP model, when data is sent from device A to device B. The 5th layer to receive data at B is the Application Layer

    Q24. Physical or logical arrangement of network is_________

    a. Topology
    b. Networking
    c. Control
    d. Routing

    Correct Answer is a (Topology)


    Q25. Challenges that occurred during season network system and applications

    a. All of these
    b. Limited Hardware
    c. Limited support for software development
    d. Limited Support of Network

    Correct Answer is a (All of these)


    Leave a Comment

    Your email address will not be published. Required fields are marked *