Only (II)
Only (I) and (II)
Only (I) and (III)
(I), (II) and (III)
[ Option C ]
WiFi and WiMAX are two popular wireless communication technologies, but they differ in coverage and standards. WiFi, based on the IEEE 802.11 family of standards, is mainly used for creating local area wireless networks with coverage typically up to 100 meters.
On the other hand, WiMAX is defined under the IEEE 802.16 standard and is designed for broadband wireless access over much larger distances, covering up to several kilometers.
The IEEE stands for Institute of Electrical and Electronics Engineers. IEEE develops global standards and supports a large community of engineers and scientists worldwide.
Q: In Wi-Fi security, which of the following protocol is more used?
WPA
WPA2
WPS
Both (a) and (c)
[ Option B ]
WPA2 (Wi-Fi Protected Access 2) is the most widely used Wi-Fi security protocol. It was introduced in 2004 and uses AES (Advanced Encryption Standard) for strong encryption and security.
Q: What is the port number of the HTTP?
80
25
20/21
23
[ Option A ]
The standard port number for HTTP (Hypertext Transfer Protocol) is 80. Port 80 is the default port used for web servers serving unencrypted traffic over HTTP.
Protocol | Port Number | Usage |
---|---|---|
FTP | 20 (Data) 21 (Command) | File Transfer Protocol. |
SSH | 22 | Secure Shell for Encrypted Remote Login. |
Telnet | 23 | Remote Login (Unencrypted). |
SMTP | 25 | Simple Mail Transfer Protocol (Email). |
DNS | 53 | Domain Name System (Name Resolution). |
HTTP | 80 | Hypertext Transfer Protocol (Web Browsing). |
POP3 | 110 | Post Office Protocol Version 3 (Email Retrieval). |
NTP | 123 | Network Time Protocol (Time Synchronization). |
IMAP | 143 | Internet Message Access Protocol (Email Management). |
HTTPS | 443 | Secure HTTP over TLS/SSL. |
SMB | 445 | Server Message Block for File Sharing. |
RDP | 3389 | Remote Desktop Protocol. |
MySQL | 3306 | MySQL Database Service. |
SIP | 5060/5061 | Session Initiation Protocol (VoIP Communication). |
DHCP | 67 (Server) 68 (Client) | Dynamic Host Configuration Protocol. |
Q: Which of the following E-Mail protocol is used to move messages through the internet from source to destination?
SMTP
IMAP
POP
UDP
[ Option A ]
SMTP (Simple Mail Transfer Protocol) is the protocol used to transfer email messages from the sender's mail server to the recipient's mail server across the internet. It is an application layer protocol that uses TCP to reliably send and relay email messages between servers until reaching the destination server.
The IMAP (Internet Message Access Protocol) and POP (Post Office Protocol) are involved in email retrieval from mail servers to client devices, not in sending emails through the internet. UDP (User Datagram Protocol) is a transport protocol used for fast, connectionless communication.
Q: Network devices _______ and _______ are used at physical layer.
Gateway, Bridge
Router, Repeater
Hub, Switch
Repeater, Hub
[ Option D ]
Physical Layer of the OSI model deals with the transmission of raw bitstreams over a physical medium. Network devices operating at the physical layer are responsible for transmitting and regenerating signals without interpreting the data.
Repeaters regenerate and amplify signals to extend the range of a network without any processing of the data.
Hubs serve as basic central connection points in Ethernet networks, forwarding signals to all ports and operating purely at the physical layer.
Network Device | OSI Layer(s) | Description |
---|---|---|
Repeater | Physical Layer | Regenerates and amplifies signals to extend network coverage. |
Hub | Physical Layer | Multiport repeater that broadcasts incoming signals to all ports, no filtering or processing. |
Network Interface Card (NIC) | Physical & Data Link Layer | Provides physical connection and MAC addressing. |
Bridge | Data Link Layer | Connects two LAN segments and filters traffic based on MAC addresses. |
Switch | Data Link Layer | Connects multiple devices on a LAN and selectively forwards data based on MAC addresses. |
Router | Network Layer | Forwards packets based on IP addresses across different networks. |
Gateway | All Layers | Connects different network architectures / protocols, can perform protocol translation. |
Modem | Physical & Data Link Layer | Modulates and demodulates analog signals for digital data transmission. |
Firewall | Network Layer & Higher Layers | Controls access, filters traffic based on rules, and protects networks from threats. |
Access Point (AP) | Physical & Data Link Layer | Connects wireless devices to a wired LAN, bridges wireless and wired networks. |
Q: IPv4 address has a size of –
32 bit
64 bit
128 bit
256 bit
[ Option A ]
An IPv4 address is a 32-bit number used to uniquely identify a device on a network. It is usually represented in dotted decimal notation as four decimal numbers separated by dots, e.g., 192.248.0.1, where each number represents 8 bits.
Feature | IPv4 | IPv6 |
---|---|---|
Address Size | 32-bit. | 128-bit. |
Address Format | Dotted decimal notation. | Hexadecimal, colon-separated. |
Address Classes | Classful addressing with classes A, B, C, D, E. | No concept of address classes. |
Checksum | Present in header. | Not present. |
Header Size | 20–60 bytes. | Fixed 40 bytes. |
Configuration | Manual or DHCP. | Auto-configuration (SLAAC) and DHCPv6. |
Security | IPSec optional. | IPSec mandatory. |
Broadcast Support | Supports broadcast. | No broadcast (uses multicast and anycast). |
Routing Efficiency | Less efficient due to large routing tables. | More efficient with hierarchical addressing. |
NAT (Network Address Translation) | Widely used due to address shortage. | Not required because of large address space. |
Subnet Mask | Supports CIDR and VLSM. | Supports CIDR but not VLSM. |
Q: Ethernet uses ________ physical address that is imprinted on the Network Interface Card (NIC).
48-bits
48-bytes
4-bytes
128-bits
[ Option A ]
Ethernet networks use MAC (Media Access Control) addresses as their physical addresses, which are permanently imprinted on the Network Interface Card (NIC) by the manufacturer. A MAC address is 48 bits long, equivalent to 6 bytes, and is usually represented in hexadecimal notation.
This unique identifier ensures that devices within the same local network can correctly recognize and communicate with each other.
Q: ARP stands for –
Address Routing Protocol
Address Routing Packet
Address Resolution Protocol
Address Routing Program
[ Option C ]
ARP (Address Resolution Protocol) is a network protocol used to map an IP Address (Logical Address) to a physical MAC Address (Physical Address) in a network.
For example, when a computer wants to send data to another device on the same network, it first uses ARP to find out the MAC address corresponding to the known IP address. This ensures that the data packets are delivered to the correct device.
Q: In FTP, there are three types of ……………., stream, block and compressed.
File Types
Data Types
Transmission Modes
None of these
[ Option C ]
FTP (File Transfer Protocol) is used to transfer files between a client and a server on a network. In FTP, data can be transferred using different transmission modes that determine how the file data is sent over the connection.
Q: Which method is used for both error detection and error correction method in computer networking?
Single Parity Check
Hamming Distance
Cyclic Redundancy Check (CRC)
Checksum
[ Option B ]
Single Parity Check, Checksum, and Cyclic Redundancy Check (CRC) are primarily error detection methods. They detect if an error has occurred in the transmitted data but do not necessarily correct the errors.
Hamming Distance refers to Hamming Code, which is a method used for both error detection and error correction. It can detect and correct single-bit errors by adding redundant bits to the data.
Q: Network layer firewall works as a—
Frame Filter
Packet Filter
Both (a) and (b)
None of these
[ Option B ]
A Network Layer firewall functions as a Packet Filter. It examines and manages the flow of data packets according to rules defined by IP addresses, Port Numbers, and communication protocols. Operating at the Network Layer (Layer 3) of the OSI model, this type of firewall makes decisions on whether to permit or deny packets without analyzing the actual data content inside them.
Q: The commonly used protocol for webpage transfer is-
HTML
HTTP
WML
WTTP
[ Option B ]
HTTP (Hypertext Transfer Protocol), is the standard protocol used to transfer web pages over the internet. It works at the Application Layer, allowing communication between web browsers and web servers. When a browser requests a webpage, HTTP facilitates sending that request to the server and receiving the webpage content, such as HTML, images, and videos, in response.
This protocol follows a client-server model, where the browser acts as the client initiating the request, and the server processes the request and sends back the required webpage data. Through this request-response communication, HTTP enables users to access and view websites on the internet efficiently.
Thank you so much for taking the time to read my Computer Science MCQs section carefully. Your support and interest mean a lot, and I truly appreciate you being part of this journey. Stay connected for more insights and updates! If you'd like to explore more tutorials and insights, check out my YouTube channel.
Don’t forget to subscribe and stay connected for future updates.