1. The IETF standards documents are called _______
Answer : A
Explanation : RFC stands for Request For Comments, and it refers to publications that explain Internet-related methods, behaviours, studies, or inventions.
2. In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are
Explanation: Each layer appends its own header to the previous tier’s packet. The IP header is inserted over the TCP header on the data packet that originated from the transport layer in the Internet layer, for example.
3. The structure or format of data is called ________
Answer : a
Explanation: Syntax is used to specify the structure and format of data. Semantics specifies how a pattern should be evaluated and what action should be taken as a result of that interpretation. The syntax of the instructions plays an important part in the creation of a program in programming languages.
4. Communication between a computer and a keyboard involves _____ transmission.
Answer : d
Explanation: Data flows in a single direction in simplex transmission, which in this context refers to data travelling from the keyboard to the computer. Another example is the mouse, which solely transmits data from the mouse to the computer.
5. The first Network was called _____
Answer : d
Explanation: ARPANET (Advanced Research Projects Agency Networks) is an acronym for Advanced Research Projects Agency Networks. It was the first network to employ the TCP/IP protocol, which was implemented in 1969.
6. A _____ is the physical path over which a message travels.
Answer : b
Explanation: Messages are sent and received via a physical path known as the medium and a set of rules known as protocol. Guided (wired) or unguided mediums exist (wireless).
7. Which organization has authority over interstate and international commerce in the communications field?
Answer : c
Explanation: The abbreviation FCC stands for Federal Communications Commission. The FCC is in charge of regulating all interstate communications that originate or terminate in the United States. In the year 1934, it was established.
8. Which of this is not a network edge device?
Answer : d
Explanation: Host systems that may host programs such as web browsers are referred to as network edge devices. A switch can’t be used as a host, but it can be utilised as a central device to handle network traffic.
9. A_____ set of rules that governs data communication.
Explanation: A protocol in communications is a set of rules and regulations that allow a network of nodes to send and receive data. Each layer in the network model has its own set of protocols, such as TCP and UDP for the transport layer.
10. Three or more devices share a link in ________ connection.
c) Point to point
Answer : b
Explanation: When three or more network nodes are connected to each other, multipoint communication is established. Multipoint connections include frame relay, Ethernet, and ATM, to name a few.
11. When collection of various computers seems a single coherent system to its client, then it is called
a) computer network
b) distributed system
c) networking system
d) mail system
Answer : b
Explanation : A computer network is a collection of interconnected computers that are connected using a single technology. A distributed system is similar to a computer network, but the fundamental difference is that the users perceive the entire collection of computers as a single coherent system.
For instance, consider the World Wide Web.
12. Two devices are in network if______
a) a process in one device is able to exchange information with a process in another device
b) a process is running on both devices
c) PIDs of the processes running of different devices are same
d) a process is active and another is inactive
Explanation : A computer network, often known as a data network, is a type of digital telecommunications network in which nodes can exchange resources. Computing equipment communicate with one another via links between nodes in computer networks. The nodes have processes in place that allow them to share a specific sort of data via a defined protocol.
13. Which of the following computer networks is built on the top of another network?
a) prior network
b) chief network
c) prime network
d) overlay network
Explanation: A computer network that is established on top of another network is known as an overlay network. Virtual Private Networks (VPNs) and Peer-to-Peer Networks are examples of overlay networks (P2P).
14. In computer network nodes are ____
a) the computer that originates the data
b) the computer that routes the data
c) the computer that terminates the data
d) all of the mentioned
Asnwer : d
Explanation : A node in a computer network can be anything that can send or receive data, as well as route data to its intended destination. Network nodes include routers, computers, and smartphones, to name a few.
15. Communication channel is shared by all the machines on the network in ______
a) broadcast network
b) unicast network
c) multicast network
d) anycast network
Explanation : Data or information is delivered to all stations in a broadcast network, whereas data or information is sent to a group of stations in a multicast network. Information is sent to only one station in a unicast network. The network’s broadcast address is the network’s most recently assigned address.