Computer Networks MCQ Quiz in मल्याळम - Objective Question with Answer for Computer Networks - സൗജന്യ PDF ഡൗൺലോഡ് ചെയ്യുക

Last updated on Apr 9, 2025

നേടുക Computer Networks ഉത്തരങ്ങളും വിശദമായ പരിഹാരങ്ങളുമുള്ള മൾട്ടിപ്പിൾ ചോയ്സ് ചോദ്യങ്ങൾ (MCQ ക്വിസ്). ഇവ സൗജന്യമായി ഡൗൺലോഡ് ചെയ്യുക Computer Networks MCQ ക്വിസ് പിഡിഎഫ്, ബാങ്കിംഗ്, എസ്എസ്‌സി, റെയിൽവേ, യുപിഎസ്‌സി, സ്റ്റേറ്റ് പിഎസ്‌സി തുടങ്ങിയ നിങ്ങളുടെ വരാനിരിക്കുന്ന പരീക്ഷകൾക്കായി തയ്യാറെടുക്കുക

Latest Computer Networks MCQ Objective Questions

Top Computer Networks MCQ Objective Questions

Computer Networks Question 1:

The acronym of NCP used in ARPANET is

  1. Network of Coalition Program
  2. National Coalition Program
  3. Network Control Protocol
  4. National Coalition Protocol

Answer (Detailed Solution Below)

Option 3 : Network Control Protocol

Computer Networks Question 1 Detailed Solution

The correct answer is Network Control Protocol

Key Points

  • In the context of ARPANET, NCP stands for Network Control Protocol. ARPANET (Advanced Research Projects Agency Network) was an early packet-switching network and the first network to implement the protocol suite TCP/IP, which became the technical foundation of the modern Internet.
  • Before the introduction of TCP/IP, ARPANET used NCP (Network Control Protocol) as its first generation protocol.
  • Implemented in 1969, NCP was responsible for enabling computers to communicate over the ARPANET network. However, NCP was a fairly simplistic protocol without the advanced features that TCP/IP would later introduce.
  • NCP operated at the network layer and provided a connection-oriented communication model, meaning that a communication link had to be established between hosts before data could be transferred.
  • It established links at the outset of a communication session and severed them when the session ended.
  • In 1983, ARPANET fully transitioned to TCP/IP from NCP, marking the beginning of the modern Internet.

Computer Networks Question 2:

A hardware networking device used to connect two LANs or LAN segment?

  1. Bridge
  2. Router
  3. HUB
  4. Broadband

Answer (Detailed Solution Below)

Option 1 : Bridge

Computer Networks Question 2 Detailed Solution

local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus, etc. A bridge can be used in computer networks to interconnect two LANs together and separate network segments. A segment is a section of a network separated by bridges, switches, and routers. 

Bridges

  • They are used to connect two or more hosts or network segments together.
  • The basic role of bridges in network architecture is storing and forwarding frames between the different segments that the bridge connects.
  • They use hardware Media Access Control (MAC) addresses for transferring frames. 

Thus, option 1 is the correct answer.

quesImage398

Hubs

  • It connects multiple computer networking devices together.
  • A hub also acts as a repeater in that it amplifies signals that deteriorate after traveling long distances over connecting cables.
  • A hub is the simplest in the family of network connecting devices because it connects LAN components with identical protocols. 

Switches

  • It generally has a more intelligent role than hubs.
  • A switch is a multiport device that improves network efficiency.
  • The switch maintains limited routing information about nodes in the internal network, and it allows connections to systems like hubs or routers.
  • Strands of LANs are usually connected using switches

Routers

  • It helps transmit packets to their destinations by charting a path through the sea of interconnected networking devices using different network topologies.
  • Routers are intelligent devices, and they store information about the networks they’re connected to.
  • Most routers can be configured to operate as packet-filtering firewalls and use access control lists (ACLs).

Computer Networks Question 3:

What are the two basic types of attacks ?

  1. Active
  2. Passive
  3. DoS
  4. Both 1 and 2
  5. None of the above

Answer (Detailed Solution Below)

Option 4 : Both 1 and 2

Computer Networks Question 3 Detailed Solution

Concept:

A cyber-attack is exploitation of computer systems and networks. It uses malicious code to alter computer code, logic, or data and leads to cybercrimes, such as information and identity theft.

  • Active attacks: An Active attack attempts to alter system resources or affect their operations. The active attack involves some modification of the data stream or creation of the false statement
  • Passive attacks: A Passive attack attempts to learn or make use of information from the system but does not affect system resources. Passive Attacks are in the nature of eavesdropping on or monitoring of transmission. The goal of the opponent is to obtain information is being transmitted. 

Computer Networks Question 4:

Which of the following hardware was used by the second generation computers?

  1. Vacuum tubes
  2. Transistors
  3. Integrated Circuit (IC)
  4. Very Large Scale Integration (VLSI)

Answer (Detailed Solution Below)

Option 2 : Transistors

Computer Networks Question 4 Detailed Solution

Generation of Computers based on Hardware

Generation

Description

1st Generation (1940 – 1956)

  • used vacuum tubes for circuitry and magnetic drums for memory
  • very expensive, large in size, slow in processing and had less storage capacity
  • used machine level language for programming

2nd Generation (1956 – 1963)

  • transistors were used instead of vacuum tube
  • smaller, faster, cheaper, more energy-efficient and more reliable than the previous generation
  • High-level programming languages were also being developed such as COBOL, FORTRAN

3rd Generation (1964 – 1971)

  • used Integrated Circuit(IC) consisting of the capacity of 300 transistors
  • small in size, low cost, large memory and high processing speed
  • known as minicomputers

4th Generation (1972 – 2010)

  • used VLSI (Very Large Scale Integration)
  • became possible to place CPU on a single chip
  • known as microcomputers

5th Generation (2010 – to date)

  • based on artificial intelligence
  • protable, superior processing speed and network connectivity
  • the aim is to develop devices that will respond to natural language inputs and be capable of learning

Computer Networks Question 5:

Consider the following statements concerning e-governance and technology:

1. Rich Site Summary (RSS) is not a very useful tool for working on Web-service technology

2. Myspace is one of the most visited networks in the world

3. Facebook.com is not the most useful social networking site of choice for most students

4. Wiki- is a group collaboration software tool working on Web-service technology

Which of the above statements are correct?

  1. 1 and 4
  2. 2 and 4
  3. 1 and 3
  4. 2 and 3

Answer (Detailed Solution Below)

Option 2 : 2 and 4

Computer Networks Question 5 Detailed Solution

RSS (Rich Site Summary):

  • RSS (Rich Site Summary) is a format for delivering regularly changing web content.
  • Many news-related sites, weblogs, and other online publishers syndicate their content as an RSS Feed to whoever wants it.
  • The benefits of RSS include solving a problem for people who regularly use the web. It allows a user to easily stay informed by retrieving the latest content from the sites you are interested in.
  • It saves time by not needing to visit each site individually. It also ensures privacy,
  • Rich Site Summary (RSS) is actually a very useful tool for working on Web-service technology.

Myspace:

  • Myspace is an American social networking service. 
  • From 2005 to 2008, it was the largest social networking site in the world, reaching more than 100 million users per month.
  • Myspace had a significant influence on technology, pop culture, and music

Facebook:

  • Facebook is the biggest social media site, with more than two billion people using it every month.
  • There are more than 65 million businesses using Facebook Pages and more than six million advertisers actively promoting their business on Facebook, which makes it pretty safe as well.
  • It is the most useful social networking site of choice for most students.

WikiWikis can be used when geographically dispersed team members need to collaborate. The wiki format is good for adding information and getting feedback from team members 

Computer Networks Question 6:

What is the full form of GPRS in mobile computing?

  1. General Packet Radio Service
  2. General Packet Route service
  3. General Package Radio Service
  4. General Packet Radiation Service

Answer (Detailed Solution Below)

Option 1 : General Packet Radio Service

Computer Networks Question 6 Detailed Solution

The correct answer is option 1.

General Packet Radio Service

  • >GPRS, or General Packet Radio Service, is a best-effort packet-switching communications protocol for cellular networks.  
  • >GPRS was one of the first widely used data transfer protocols on cellular networks.
  • >GPRS is a third-generation step toward internet access.
  • >GPRS is also known as GSM-IP that is a Global-System Mobile Communications Internet Protocol as it keeps the users of this system online, allows them to make voice calls, and access the internet on-the-go.
  •  
  •  
  •  
  •  
  •  
  •  
  •  

Computer Networks Question 7:

Which of the following technique(s) used in networking?

  1. Circuit switching
  2. Message switching
  3. All of the options
  4. Packet switching

Answer (Detailed Solution Below)

Option 3 : All of the options

Computer Networks Question 7 Detailed Solution

Switching techniques:

  1. Switched communication networks are those in which data transferred from source to destination is routed between various intermediate nodes. 
  2. Switching is the technique by which nodes control or switch data to transmit it between specific points on a network.
  3. The switch is a mechanism that makes it possible to interconnect links to form a large network. 
  4. Generally, switches have some input ports and output ports.
  5. The number of ports in a switch is limited to less than five in normal cases. 
  6. The role of a switch in a network is to receive messages, data, packets from one link connected to the switch and transmit the received information to some other node connected to the switch by another link.

 

There are 3 common switching techniques:

1. Circuit Switching - In the circuit switching, between two nodes there is a dedicated channel for the transmission of data. The circuit is dedicated between two nodes the channel guaranty the full bandwidth of the channel for the transmission. The circuit switching is mainly used for voice circuits.

2. Packet Switching - In this switching data are passed as several small packets. These packets are the small portion of the larger message broken into small packets. Each packet has some control instructions to process the data.

3. Message Switching - In message switching each node receives and stores data in a small memory called buffer. Next, the switch looks for another link of the router for forwarding the message. This link is selected by the routing. While some link is busy, the message is stored in the buffer space providing a queue priority for the message inside the buffer.

Thus, option 4 is the correct answer.

Computer Networks Question 8:

What is the full form of DHCP?

  1. Dynamic Host Configuration Protocol
  2. Dynamic Host communication Protocol
  3. Digital Host Configuration Protocol
  4. Digital Host Communication Protocol

Answer (Detailed Solution Below)

Option 1 : Dynamic Host Configuration Protocol

Computer Networks Question 8 Detailed Solution

The correct answer is Dynamic Host Configuration Protocol.

Key Points

  • DHCP -  Dynamic Host Configuration Protocol (DHCP). It is a network management protocol used to automatically assign IP addresses to hosts on a network. It assigns the IP address to the host so that they can communicate with each other.

Additional Information

  • In a computer network, if a host wants to communicate with another host, then for this it should have a unique IP address.
  • You can manually configure these IP addresses on every host. But if the network is big enough then this approach will not work. In large networks, you cannot manually assign IP addresses to every host. To solve this problem we used Dynamic Host Configuration Protocol DHCP.60b75bab27e5b285882dd09b 16560893717221

Computer Networks Question 9:

The computer software that runs a computer, including scheduling tasks, managing storage and handling communication with peripherals is called:

  1. Bluetooth Technology
  2. Operating System
  3. Application Suite
  4. Device Driver

Answer (Detailed Solution Below)

Option 2 : Operating System

Computer Networks Question 9 Detailed Solution

The computer software that runs a computer, including scheduling tasks, managing storage, and handling communication with peripherals is called an Operating System. 

A computer’s operating system is a group of programs designed to serve two basic purposes:

  • To control the allocation and use of the computing system’s resources among the various users and tasks, and
  • To provide an interface between the computer hardware and the programmer that simplifies and makes feasible the creation, coding, debugging, and maintenance of application programs

An effective operating system should accomplish the following functions:

  • Should act as a command interpreter by providing a user-friendly environment.
  • Should facilitate communication with other users.
  • Facilitate the directory/file creation along with the security option.
  • Assure that when there are several active processes in the computer, each will get fair and non-interfering access to the central processing unit for execution.
  • Take care of storage and device allocation.
  • Provide for long term storage of user information in the form of files.
  • Permit system resources to be shared among users when appropriate, and be protected from unauthorized or mischievous intervention as necessary

NOTE: 

  • Bluetooth Technology: It was developed in order to connect two devices without wires. The range in which Bluetooth technology works is 10 meters (or 30 feet approx) only. 
  • A device driver manages communication with a specific Input-Output device by converting a logical request from a user into specific commands directed to the device.
  • Application Suite is a set of software programs with related functions. for example word processing, email applications, and spreadsheets, etc.

Computer Networks Question 10:

Which of the following statements is/are correct?

A. A Local Area Network (LAN) is usually located on one brand of computer

B. The acronym 'ISP' stands for Internet Standard Provider

Choose the correct answer from the options given below:

  1. A only
  2. B only
  3. Both A and B
  4. Neither A nor B

Answer (Detailed Solution Below)

Option 4 : Neither A nor B

Computer Networks Question 10 Detailed Solution

Local Area Networks:

  • LANs are high speed, fault-tolerant data networks that cover a relatively small geographic area.
  • They are widely used to connect personal computers and work stations in company offices and factories to share resources (e.g. files) and exchange information.
  • A Local Area Network (LAN) is usually located on computers irrespective of their brands, it is not necessary to have one brand for using LAN.
  • LAN offers computer users many advantages including shared access to devices and applications, file exchanges, file exchange between connected users, and communication between the users via electronic mail and other applications.

General Characteristics of LAN:

  • The cost of setting up networks is usually low.
  • Data transfer rates are- between 10 to 100 Mbps.
  • Each device connected in the network can either operate standalone or in the Network.
  • The area covered is small.
  • All the connected devices in the network share the transmission media

 

An Internet service provider (ISP)

  • It is an organization that provides services for accessing, using, or participating in the Internet.
  • It connects people to the Internet and provides other allied services such as Web site building and hosting.
  • An ISP has the equipment and the telecommunication line access required to have a point of presence on the Internet for the geographic area served. 
  • Internet services typically provided by ISPs include Internet access, Internet transit, domain name registration, web hosting, Usenet service, and collocation.

The two main services provided by ISPs are:

  • Web site building and hosting; done by an entity that provides space and management for individual or business Web sites; and
  • Access providing; done by an entity that arranges for an individual or an organization to have access to the Internet. 

 

NOTE: Therefore, by the explanations provided above it is clear that both the statements are incorrect.

Get Free Access Now
Hot Links: teen patti gold downloadable content teen patti jodi teen patti casino