Computer Networks MCQ Quiz - Objective Question with Answer for Computer Networks - Download Free PDF

Last updated on Jun 19, 2025

Computer networks refer to inter-connected systems of computers and other devices that facilitate communication and the sharing of resources. They enable the transfer of data and information between multiple devices, allowing users to access resources, such as files, printers, and internet connectivity. Computer networks can be local area networks (LANs), connecting devices within a limited area, or wide area networks (WANs), connecting devices across larger geographical distances. They rely on protocols and networking technologies to establish connections and ensure efficient and secure data transmission. Computer networks play a vital role in various domains, including businesses, education, research, and personal communication, enabling collaboration, information sharing, and access to remote resources. Check your knowledge of Computer Networks about operating systems by solving the given Computer Networks MCQs.

Latest Computer Networks MCQ Objective Questions

Computer Networks Question 1:

MAC address is written in which format?

  1. Hexa decimal format
  2. Decimal format
  3. Binary format
  4. Octal format 
  5. None of the above

Answer (Detailed Solution Below)

Option 1 : Hexa decimal format

Computer Networks Question 1 Detailed Solution

The correct answer is Hexa decimal format

Key Points

MAC address is written in Hexadecimal format.

MAC address:

  • A media access control address (MAC) is a unique identifier assigned to a network interface controller for use as a network address in communications within a network segment.
  • This use is common in most IEEE 802 network technologies, including Ethernet, Wi-fi, and Bluetooth.
  • Every NIC ( Network Interface Controller) has a hardware address that's known as a MAC, for media access control where IP addresses are associated with TCP/IP (networking software), MAC addresses are linked to the hardware of network adapters.
  • MAC addresses are recognizable as six groups of two hexadecimal digits, separated, by hyphens, colons, or without a separator.
  • A MAC address is a 48-bit number.
  • A network interface controller is a computer hardware component that connects a computer to a computer network.

Computer Networks Question 2:

Each NIC has a ___________ address, which helps in uniquely identifying the computer.

  1. IP Address
  2. Website Address
  3. Email Address
  4. MAC Address
  5. None of the above

Answer (Detailed Solution Below)

Option 4 : MAC Address

Computer Networks Question 2 Detailed Solution

The correct option is (4)

Mac Address

Concept:-

A network interface controller (NIC) is given a media access control address (MAC address), which it can use as a network address in communications inside a network segment.

Key Points

  • To send Ethernet frames to a computer, utilize the MAC address. The operating system and the NIC exchange data through the NIC driver software.
  • Although each MAC address is exclusive to the network card that is placed on a device, because there are only so many device-identifying bits available, manufacturers occasionally reuse them.
  • NIC, or network interface card, is a shortened form. Network adapter and Ethernet card are other names for NIC. The device that enables a computer to connect to a network, such as a home network, is an expansion card or hardware interface.

Additional Information IP Address:- Each node in a network can be uniquely identified using its IP address, commonly referred to as the Internet Protocol Address. Each node in a network that makes use of the Internet Protocol is given an IP address.

Website Address:- The address bar, which is often at the top of your web browser window, contains the website's URL. A computer can find and open a web page on another computer through the internet thanks to the URL.

Email Address:- An email address identifies an email box to which messages are delivered.

Computer Networks Question 3:

The ___________ service allows a group of Internet users to exchange their views on some common topic.

  1. Nicnet
  2. Milnet
  3. Telnet
  4. Usenet
  5. None of the above

Answer (Detailed Solution Below)

Option 4 : Usenet

Computer Networks Question 3 Detailed Solution

The correct answer is Usenet.

Key Points

  • Usenet is a worldwide system for internet discussion that consists of a set of newsgroups that are organized by subject.
  • Users post articles or messages to these newsgroups.
  • The articles are then broadcast to other computer systems, most of which now connect via the Internet.
  • Usenet was conceived in 1979, making it one of the oldest network communications systems still in use today.
  • It is also the predecessor of many of the forums online today.

Key Points

  • Nicnet:
    • It is a satellite-based nation-wide computer-communication network, that is a type of Wide Area Network (WAN).
  • Milnet:
    • it was the name given to a network that split off from ARPANET in 1983 to create an internetwork designated for use by the U.S. Department of Defense.
    • It later became part of the DoD Defense Network (DDN).
  • Telnet:
    • It is a network protocol used to virtually access a computer and to provide a two-way, collaborative and text-based communication channel between two machines.

Computer Networks Question 4:

Functional expression of the idea/invention will be protected by ______

  1. copyright
  2. patent
  3. registered trademark
  4. None of the above
  5. None of the above

Answer (Detailed Solution Below)

Option 2 : patent

Computer Networks Question 4 Detailed Solution

The correct answer is patent.

Key Points

  • A patent is an invention-grounded legal document that defines and provides the deliverer with exclusive rights to count others from producing, dealing, or distributing such an invention.
  • Functional expression of the idea/invention will be protected by patent.
  • The violation of these exclusive rights of the patent holder is known as a patent violation.
  • A patent protects an invention for 20 years from the date the patent is applied, after which it can be freely used.

 Additional Information

  • Copyright: Copyright is referred to as a tool used to protect the authors' original works like novels, art, architecture, music and so on. The copyright ensures that only the owner has the right to project, share and license the content.
  • Registered trademark: A registered trademark is used for protecting the brands, logos, and slogans of an organisation.

 

Computer Networks Question 5:

Which of the following protocols uses both TCP and UDP?

1) FTP

2) SMTP

3) Telnet

4) DNS

  1. 1
  2. 3
  3. 4
  4. 2
  5. None of the above

Answer (Detailed Solution Below)

Option 3 : 4

Computer Networks Question 5 Detailed Solution

Explanation:

DNS uses TCP for zone exchanges between servers and UDP when a client is trying to resolve a hostname to an IP address.

1. The Domain Name System (DNS) is the phonebook of the Internet. Humans access information online through domain names, like nytimes.com or espn.com. Web browsers interact through Internet Protocol (IP) addresses. DNS translates domain names to IP addresses so browsers can load Internet resources.

2. Each device connected to the Internet has a unique IP address that other machines use to find the device. DNS servers eliminate the need for humans to memorize IP addresses such as 192.168.1.1 (in IPv4), or more complex newer alphanumeric IP addresses such as 2400:cb00:2048:1::c629:d7a2 (in IPv6).

Working of DNS:

  • When a user types a human-readable address into the browser, the operating system’s DNS client will check for information in a local cache. If the requested address isn’t there, it will look for a Domain Name System server in the local area network (LAN). When the local DNS server receives the query, and the requested domain name is found, it will return the result.
  • If the name is not found, the local server will forward the query to a DNS cache server, often provided by the Internet Service Provider (ISP). Since the DNS server’s cache contains a temporary store of DNS records, it will quickly respond to requests. These DNS cache servers are called not authoritative DNS servers as they provide request resolution based in a cached value acquired from authoritative DNS servers.

Confusion Points

Some Standard books say that DNS uses UDP only, But in implementation DNS also using TCP as well.

Top Computer Networks MCQ Objective Questions

What is the full form of 'LAN'?

  1. Line Area Network
  2. Linear Area Network
  3. Local Area Network
  4. Land Area Network

Answer (Detailed Solution Below)

Option 3 : Local Area Network

Computer Networks Question 6 Detailed Solution

Download Solution PDF

The correct answer is Local Area Network (LAN):

Important Points

  • It is a computer network within a small geographical area.
  • A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN.

In computing, ________ is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

  1. Spyware
  2. Cookie
  3. Spam
  4. Firewall

Answer (Detailed Solution Below)

Option 4 : Firewall

Computer Networks Question 7 Detailed Solution

Download Solution PDF

The correct answer is option 4) i.e. Firewall.

  • A firewall is a type of computer-security system.
  • A firewall controls the flow of data from one computer or network to another and they are mainly intended to protect an individual computer system or a network from being accessed by an intruder, especially via the Internet.

Note:

  • Cookies are small files that are stored on a user's computer. They are designed to hold a modest amount of data specific to a particular client and website and can be accessed either by the web server or the client computer. 
  • Spam is an undesired or illegal email message.
  • Spyware is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information. 

Which of the following devices performs signal conversion?

  1. Modulator 
  2. Mouse
  3. Plotter
  4. Keyboard

Answer (Detailed Solution Below)

Option 1 : Modulator 

Computer Networks Question 8 Detailed Solution

Download Solution PDF

The correct answer is Modulator

Key Points

  • A modulator is a device that performs signal conversion. It works by varying one or more properties of a high-frequency periodic waveform, called the carrier signal, according to a modulating signal which typically contains information to be transmitted. This process is known as modulation.
  • The types of modulation include amplitude modulation (AM), frequency modulation (FM), and phase modulation (PM), among others. These modulation techniques allow for the encoding of information into the carrier signal, which can then be transmitted over a communication channel. When the signal reaches its destination, a demodulator extracts the original information from the modulated carrier.

 Additional Information

  • A mouse is a handheld pointing device that detects two-dimensional motion relative to a surface.
  • A plotter is a device that creates hardcopy graphics. They are like printers, but instead of rendering text, plotters draw images using a pen.
  • A keyboard is an input device used to enter text and commands into the computer. Each key represents a specific character or function.

Which among the following network topologies has the highest transmission speed?

A) LAN

B) WAN

C) MAN

D) Both LAN and WAN have equal transmission speeds.

  1. A
  2. B
  3. D
  4. C

Answer (Detailed Solution Below)

Option 1 : A

Computer Networks Question 9 Detailed Solution

Download Solution PDF

Option 1 is the correct answer: Local Area Network (LAN) has the highest transmission speed.

Network type Features
Local Area Network (LAN)
  • The coverage area may be limited to a room or a building or a group of buildings.
  • For eg.: Devices at your home or office connected to each other or with a common router.
  • Connections can be established either through Ethernet cables or radio waves.
Metropolitan Area Network (MAN)
  • It interconnects the computers/users located in a bigger geographical area as compared to a LAN.
  • For eg.: A chain of emergency response teams across a big city.
Wide Area Network (WAN)
  • It covers the largest area as compared to LAN and MAN. It can cover the whole country.
  • The Internet is the best example of WAN.

Unsolicited electronic messages sent for marketing purposes are called______.

  1. virus
  2. unzip
  3. spam
  4. URL

Answer (Detailed Solution Below)

Option 3 : spam

Computer Networks Question 10 Detailed Solution

Download Solution PDF

The correct answer is spam.

Key Points

  • Any unwanted, uninvited digital communication transmitted in bulk is referred to as spam.
  • Spam is frequently transmitted by email.
  • But it can also be sent through social media, text messages, and phone calls.
  • Cybercriminals send phishing emails to a large number of recipients in an effort to "hook" a select few recipients.
  • Phishing emails con people into disclosing private data like credit card numbers or website logins. 

Additional Information

  • Virus:
    • A computer virus is a form of malware that accompanies another program and has the ability to multiply and propagate once it has been run on a machine. 
  • Unzip:
    • Extraction of the files from a single-file zip archive or other comparable file archive is known as unzipping.
  • URL:
    • URL stands for Uniform Resource Locator.
    • A URL is nothing more than the Web address of a specific, particular resource.

What is the term for a cyber-security attack that targets multiple interconnected devices simultaneously to create a large- scale attack network?

  1. DDoS attack
  2. Botnet attack
  3. Zero-day attack
  4. Spear phishing attack

Answer (Detailed Solution Below)

Option 2 : Botnet attack

Computer Networks Question 11 Detailed Solution

Download Solution PDF

The correct answer is Botnet attack.

Key Points

  • Botnet is a network of computers that have been infected with malware and are controlled by a single attacker. The attacker can use the botnet to launch a variety of attacks, including DDoS attacks.
  • DDoS attack is a cyber-security attack that targets a website or server with a flood of traffic. This traffic can overwhelm the website or server, making it unavailable to legitimate users.
  • Zero-day attack is an attack that exploits a vulnerability in software that the software vendor is not aware of. This means that there is no patch available to fix the vulnerability, making it very difficult to defend against.
  • A spear phishing attack is a targeted attack that is designed to trick the victim into clicking on a malicious link or opening an infected attachment.
  • Therefore, the term for a cyber-security attack that targets multiple interconnected devices simultaneously to create a large-scale attack network is botnet attack.

Additional Information

Here are some ways to protect yourself from botnet attacks:

  • Keep your software up to date. Software vendors often release patches to fix security vulnerabilities.
  • Use a firewall. A firewall can help to block malicious traffic from reaching your computer.
  • Use antivirus software. Antivirus software can help to detect and remove malware from your computer.
  • Be careful about what websites you visit and what links you click on.
  • Do not open attachments from unknown senders.

Which among the following protocols is known as the terminal emulation protocol?

  1. HTTP
  2. FTP
  3. SMTP
  4. TELNET

Answer (Detailed Solution Below)

Option 4 : TELNET

Computer Networks Question 12 Detailed Solution

Download Solution PDF
  • TELNET is the terminal emulation protocol in a TCP/IP environment for the remote access of a terminal (client) to a server.
  • TELNET uses the TCP as the transport protocol to establish a connection between server and client.

IPv6 addresses have a size of:

  1. 64 bits
  2. 128 bits
  3. 256 bits
  4. 512 bits

Answer (Detailed Solution Below)

Option 2 : 128 bits

Computer Networks Question 13 Detailed Solution

Download Solution PDF

The correct answer is 128 bits.

Key Points

  • An IPv6 address has a size of 128 bits.
  • Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet.
  • IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion.
  • IPv6 is intended to replace IPv4.
  • 1 Bytes is equal to 8 bit

 

Additional Information

  • IPv4 (Internet Protocol version 4) uses a 32-bit addressing scheme.
  • This means that IPv4 addresses are composed of 32 binary bits, which are typically represented as four sets of decimal numbers separated by periods (e.g., 192.168.0.1).
  • Each decimal number in the address represents an 8-bit segment, also known as an octet, resulting in a total of four octets in an IPv4 address.

MAC address is written in which format?

  1. Hexa decimal format
  2. Decimal format
  3. Binary format
  4. Octal format 

Answer (Detailed Solution Below)

Option 1 : Hexa decimal format

Computer Networks Question 14 Detailed Solution

Download Solution PDF

The correct answer is Hexa decimal format

Key Points

MAC address is written in Hexadecimal format.

MAC address:

  • A media access control address (MAC) is a unique identifier assigned to a network interface controller for use as a network address in communications within a network segment.
  • This use is common in most IEEE 802 network technologies, including Ethernet, Wi-fi, and Bluetooth.
  • Every NIC ( Network Interface Controller) has a hardware address that's known as a MAC, for media access control where IP addresses are associated with TCP/IP (networking software), MAC addresses are linked to the hardware of network adapters.
  • MAC addresses are recognizable as six groups of two hexadecimal digits, separated, by hyphens, colons, or without a separator.
  • A MAC address is a 48-bit number.
  • A network interface controller is a computer hardware component that connects a computer to a computer network.

Which one of the following protocols is used for E-mail services?

  1. HTTP
  2. IP
  3. SMTP
  4. PPP

Answer (Detailed Solution Below)

Option 3 : SMTP

Computer Networks Question 15 Detailed Solution

Download Solution PDF

The correct answer is SMTP.

Key Points 

  • SMTP:- The Simple Mail Transfer Protocol (SMTP) is used for the transfer of mail messages and attachments.
  • IP:- The Internet Protocol (IP) is a routable protocol responsible for IP addressing and the fragmentation and reassembly of packets.
  • UDP:- UDP provides a one-to-one or one-to-many, connectionless, unreliable communications service. UDP is used when the amount of data to be transferred is small.

Hot Links: teen patti comfun card online teen patti master purana teen patti master list teen patti chart real cash teen patti