14 total views
Welcome to our blog on Advanced Computer Network, where we explore some of the most common questions and answers in the field. Whether you are a seasoned developer, a curious student, or simply someone interested in the latest trends in technology. This blog is designed to help you expand your knowledge and stay up to date with the latest advancements in computer science. You can also watch our Training videos in our YouTube Channel EasyWay2Learn. Where you can find tutorial based on Robotic Process Automation.
Q1. Which of these is not used by intranet?
Correct Answer is c (BSNL)
Explanation: Intranet is a company’s internal web and uses TCP/IP, HTTP and other internet protocols. Its main object is to share company information among employees
Q2. In segment header, sequence number and acknowledgement number fields refer to_____
a. Segment Number
b. Byte Number
d. Buffer Number
Correct Answer is b (Byte Number)
Explanation: TCP must ensure ordered delivery of packets. Sequence number and acknowledgement number are used to identify the byte number of the packet.
Q3. Which of the following routing algorithms can be used for network layer design?
a. All of These
b. Distance Vector Routing
c. Link State Routing
d. Shortest Path Algorithm
Correct Answer is a (All of These)
Explanation: The routing algorithm is what decides where a packet should go next. There are several routing techniques like shortest path algorithm, static and dynamic routing, decentralized routing, distance vector routing, link state routing, Hierarchical routing etc.
Q4. HTML is used to create.
a. High Level Program
b. Machine Language Program
c. Web Page
d. Web Server
Correct Answer is c (Web Page)
Explanation: HTML is Hyper Text Markup Language that use for creating Web pages
Q5. Networks of interconnected, battery-powered, wireless sensors placed in the physical Environment.
Correct Answer is d (WSN)
Explanation: WSNs are networks of hundreds of interconnected wireless devices that are embedded into the physical environment to provide measurement of many points over large spaces
Q6. What is the full form of WLAN?
a. Wireless Local Area Node
b. Wide Local Area Network
c. Wireless Land Access Network
d. Wireless Local Area Network
Correct Answer is d (Wireless Local Area Network)
Q7. _______Router user queries or command to appropriate the nodes in a sensor network.
a. All of these
d. None of these
Correct Answer is c (Gateway)
Q8. Intranet is a company’s internal web.
Correct Answer is a (True)
Q9. The File Transfer Protocol is built on_____________
a. Connection Oriented Architecture
b. Service Oriented Architecture
c. Client Server Architecture
d. Data Centric Architecture
Correct Answer is c (Client Server Architecture)
Explanation: File Transfer Protocol (FTP) is built on a client–server model architecture. which uses separate control and data connections between the client and the server
Q10. In File Transfer Protocol, data transfer cannot be done in__________
a. Block mode
b. Compressed mode
c. Message mode
d. Stream mode
Correct Answer is c (Message mode)
Explanation: In FTP, the Data transfer cannot be done in message mode
Q11. An antenna connecting a mobile device to a wired local area network.
a. Wireless Access Point
c. Mobile Commerce
Correct Answer is a (Wireless Access Point)
Q12. A _____ is a TCP name for a transport service access point.
Correct Answer is c (Port)
Explanation: A Port facilitates the packet transmission to the destination from the source
Q13. The _____ field is used to detect errors over the entire user datagram.
b. Udp Header
c. Destination Port
d. Source Port
Correct Answer is a (Checksum)
Explanation: The Checksum field is used to detect errors over the entire user datagram
Q14. Which address is used to identify a process on a host by the transport layer?
a. Physical Address and Logical Address
b. Port Address
c. Specific Address
d. All of the Mentioned
Correct Answer is b (Port Address)
Explanation: Port number is use to identify a specific process in which a network message is to be forwarded when it arrives at a server
Q15. Connection establishment in TCP is done by which mechanism?
a. Three-Way Handshaking
b. Flow Control
Correct Answer is a (Three-Way Handshaking)
Explanation: Transmission Control Protocol (TCP) uses a three-way handshake to establish a reliable connection and the connection is full duplex, and both sides synchronize and acknowledge each other
16. Which one of the following is a version of UDP with congestion control
a. User Congestion Control Protocol
b. Datagram Congestion Control Protocol
c. Structured Stream Transport
d. Stream Control Transmission Protocol
Correct Answer is (Datagram Congestion Control Protocol)
Explanation: Datagram congestion control protocol is a congestion-controlled version of UDP
Q17. In wireless ad-hoc network (WANET)__
a. Nodes are not required.
b. Access point is not required.
c. All nodes are access points.
d. Access point is must.
Correct Answer is b (Access point is not required)
Q18. Transport layer protocols deals with__________
a. Process To Process Communication
b. Man To Man Communication
c. Node To Node Communication
d. Application To Application Communication
Correct Answer is a (Process To Process Communication)
Explanation: Transport layer is 4th layer in TCP/IP model and OSI reference model. Transport layer deals with logical communication between process and responsible for delivering a message between network host.
Q19. Which of the Following are the challenges in mobile computing?
a. Low Power and resources
b. High band width
c. Security risk
d. All of these
Correct Answer is d (All of these)
Q20. Which layer is used to link the network support layers and user support layers?
a. Session Layer
b. Application Layer
c. Transport Layer
d. Link Layer
Correct Answer is c (Transport Layer)
Explanation: Physical, data link and network layers are network support layers. Session, presentation and application layers are user support layers. The transport layer links these layers by segmenting and rearranging the data
Q21. A wireless network interface controller can work in______
a. both infrastructure mode and ad-hoc mode
b. WDS mode
c. infrastructure mode
d. ad-hoc mode
Correct Answer is a (both infrastructure mode and ad-hoc mode)
Explanation: A wireless network interface controller can work in both infrastructure mode and ad-hoc mode
Q22. Header of a frame generally contains_____________
a. Synchronization Bytes
b. All of These
c. Frame Identifier
Correct Answer is d (Addresses)
Explanation: The header of a frame generally contains addresses
Q23. In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ______
a. Session Layer
b. Link Layer
c. Transport Layer
d. Application Layer
Correct Answer is d (Application Layer)
Explanation: In TCP/IP model, when data is sent from device A to device B. The 5th layer to receive data at B is the Application Layer
Q24. Physical or logical arrangement of network is_________
Correct Answer is a (Topology)
Q25. Challenges that occurred during season network system and applications
a. All of these
b. Limited Hardware
c. Limited support for software development
d. Limited Support of Network
Correct Answer is a (All of these)