Computer Networks MCQ Quiz in मल्याळम - Objective Question with Answer for Computer Networks - സൗജന്യ PDF ഡൗൺലോഡ് ചെയ്യുക
Last updated on Apr 5, 2025
Latest Computer Networks MCQ Objective Questions
Top Computer Networks MCQ Objective Questions
Computer Networks Question 1:
What are the two basic types of attacks ?
Answer (Detailed Solution Below)
Computer Networks Question 1 Detailed Solution
Concept:
A cyber-attack is exploitation of computer systems and networks. It uses malicious code to alter computer code, logic, or data and leads to cybercrimes, such as information and identity theft.
- Active attacks: An Active attack attempts to alter system resources or affect their operations. The active attack involves some modification of the data stream or creation of the false statement
- Passive attacks: A Passive attack attempts to learn or make use of information from the system but does not affect system resources. Passive Attacks are in the nature of eavesdropping on or monitoring of transmission. The goal of the opponent is to obtain information is being transmitted.
Computer Networks Question 2:
Which of the following hardware was used by the second generation computers?
Answer (Detailed Solution Below)
Computer Networks Question 2 Detailed Solution
Generation of Computers based on Hardware |
|
Generation |
Description |
1st Generation (1940 – 1956) |
|
2nd Generation (1956 – 1963) |
|
3rd Generation (1964 – 1971) |
|
4th Generation (1972 – 2010) |
|
5th Generation (2010 – to date) |
|
Computer Networks Question 3:
The identification given to a computer connection to a network is known as
Answer (Detailed Solution Below)
Computer Networks Question 3 Detailed Solution
Concept:
Process ID (PID)
This is a unique number that helps in identifying a hardware product or a registered software product.
It identifies each running processes in an operating system.
IP address
An IP address is a unique address that identifies the device on the internet or a local network.
- IP stands for the Internet Protocol which is having the set of rules governing the format of data sent via internet or local network.
- This is differentiated into different classes based on the width.
SYSID
The SYSID file records the network interface addresses that the File Server registers in the volume location Database for the local file server machine.
Each time the File Server restarts, it builds a list of interfaces on the local machine by reading the /usr/afs/local/NetInfo file, if it exists.
Conclusion:
IP address is the identification number given to the computer connection to a network .
Computer Networks Question 4:
Consider the following statements concerning e-governance and technology:
1. Rich Site Summary (RSS) is not a very useful tool for working on Web-service technology
2. Myspace is one of the most visited networks in the world
3. Facebook.com is not the most useful social networking site of choice for most students
4. Wiki- is a group collaboration software tool working on Web-service technology
Which of the above statements are correct?
Answer (Detailed Solution Below)
Computer Networks Question 4 Detailed Solution
RSS (Rich Site Summary):
- RSS (Rich Site Summary) is a format for delivering regularly changing web content.
- Many news-related sites, weblogs, and other online publishers syndicate their content as an RSS Feed to whoever wants it.
- The benefits of RSS include solving a problem for people who regularly use the web. It allows a user to easily stay informed by retrieving the latest content from the sites you are interested in.
- It saves time by not needing to visit each site individually. It also ensures privacy,
- Rich Site Summary (RSS) is actually a very useful tool for working on Web-service technology.
Myspace:
- Myspace is an American social networking service.
- From 2005 to 2008, it was the largest social networking site in the world, reaching more than 100 million users per month.
- Myspace had a significant influence on technology, pop culture, and music
Facebook:
- Facebook is the biggest social media site, with more than two billion people using it every month.
- There are more than 65 million businesses using Facebook Pages and more than six million advertisers actively promoting their business on Facebook, which makes it pretty safe as well.
- It is the most useful social networking site of choice for most students.
Wiki: Wikis can be used when geographically dispersed team members need to collaborate. The wiki format is good for adding information and getting feedback from team members
Computer Networks Question 5:
Which of the following technique(s) used in networking?
Answer (Detailed Solution Below)
Computer Networks Question 5 Detailed Solution
Switching techniques:
- Switched communication networks are those in which data transferred from source to destination is routed between various intermediate nodes.
- Switching is the technique by which nodes control or switch data to transmit it between specific points on a network.
- The switch is a mechanism that makes it possible to interconnect links to form a large network.
- Generally, switches have some input ports and output ports.
- The number of ports in a switch is limited to less than five in normal cases.
- The role of a switch in a network is to receive messages, data, packets from one link connected to the switch and transmit the received information to some other node connected to the switch by another link.
There are 3 common switching techniques:
1. Circuit Switching - In the circuit switching, between two nodes there is a dedicated channel for the transmission of data. The circuit is dedicated between two nodes the channel guaranty the full bandwidth of the channel for the transmission. The circuit switching is mainly used for voice circuits.
2. Packet Switching - In this switching data are passed as several small packets. These packets are the small portion of the larger message broken into small packets. Each packet has some control instructions to process the data.
3. Message Switching - In message switching each node receives and stores data in a small memory called buffer. Next, the switch looks for another link of the router for forwarding the message. This link is selected by the routing. While some link is busy, the message is stored in the buffer space providing a queue priority for the message inside the buffer.
Thus, option 4 is the correct answer.
Computer Networks Question 6:
The computer software that runs a computer, including scheduling tasks, managing storage and handling communication with peripherals is called:
Answer (Detailed Solution Below)
Computer Networks Question 6 Detailed Solution
The computer software that runs a computer, including scheduling tasks, managing storage, and handling communication with peripherals is called an Operating System.
A computer’s operating system is a group of programs designed to serve two basic purposes:
- To control the allocation and use of the computing system’s resources among the various users and tasks, and
- To provide an interface between the computer hardware and the programmer that simplifies and makes feasible the creation, coding, debugging, and maintenance of application programs
An effective operating system should accomplish the following functions:
- Should act as a command interpreter by providing a user-friendly environment.
- Should facilitate communication with other users.
- Facilitate the directory/file creation along with the security option.
- Assure that when there are several active processes in the computer, each will get fair and non-interfering access to the central processing unit for execution.
- Take care of storage and device allocation.
- Provide for long term storage of user information in the form of files.
- Permit system resources to be shared among users when appropriate, and be protected from unauthorized or mischievous intervention as necessary
NOTE:
- Bluetooth Technology: It was developed in order to connect two devices without wires. The range in which Bluetooth technology works is 10 meters (or 30 feet approx) only.
- A device driver manages communication with a specific Input-Output device by converting a logical request from a user into specific commands directed to the device.
- Application Suite is a set of software programs with related functions. for example word processing, email applications, and spreadsheets, etc.
Computer Networks Question 7:
Which of the following statements is/are correct?
A. A Local Area Network (LAN) is usually located on one brand of computer
B. The acronym 'ISP' stands for Internet Standard Provider
Choose the correct answer from the options given below:
Answer (Detailed Solution Below)
Computer Networks Question 7 Detailed Solution
Local Area Networks:
- LANs are high speed, fault-tolerant data networks that cover a relatively small geographic area.
- They are widely used to connect personal computers and work stations in company offices and factories to share resources (e.g. files) and exchange information.
- A Local Area Network (LAN) is usually located on computers irrespective of their brands, it is not necessary to have one brand for using LAN.
- LAN offers computer users many advantages including shared access to devices and applications, file exchanges, file exchange between connected users, and communication between the users via electronic mail and other applications.
General Characteristics of LAN:
- The cost of setting up networks is usually low.
- Data transfer rates are- between 10 to 100 Mbps.
- Each device connected in the network can either operate standalone or in the Network.
- The area covered is small.
- All the connected devices in the network share the transmission media
An Internet service provider (ISP)
- It is an organization that provides services for accessing, using, or participating in the Internet.
- It connects people to the Internet and provides other allied services such as Web site building and hosting.
- An ISP has the equipment and the telecommunication line access required to have a point of presence on the Internet for the geographic area served.
- Internet services typically provided by ISPs include Internet access, Internet transit, domain name registration, web hosting, Usenet service, and collocation.
The two main services provided by ISPs are:
- Web site building and hosting; done by an entity that provides space and management for individual or business Web sites; and
- Access providing; done by an entity that arranges for an individual or an organization to have access to the Internet.
NOTE: Therefore, by the explanations provided above it is clear that both the statements are incorrect.
Computer Networks Question 8:
Which of the following technique(s) used in networking?
Answer (Detailed Solution Below)
Computer Networks Question 8 Detailed Solution
The correct answer is All of the options
Key Points
Switching techniques:
- Switched communication networks are those in which data transferred from source to destination is routed between various intermediate nodes.
- Switching is the technique by which nodes control or switch data to transmit it between specific points on a network.
- The switch is a mechanism that makes it possible to interconnect links to form a large network.
- Generally, switches have some input ports and output ports.
- The number of ports in a switch is limited to less than five in normal cases.
- The role of a switch in a network is to receive messages, data, packets from one link connected to the switch and transmit the received information to some other node connected to the switch by another link.
There are 3 common switching techniques:
- Circuit Switching - In the circuit switching, between two nodes there is a dedicated channel for the transmission of data. The circuit is dedicated between two nodes the channel guaranty the full bandwidth of the channel for the transmission. The circuit switching is mainly used for voice circuits.
- Packet Switching - In this switching data are passed as several small packets. These packets are the small portion of the larger message broken into small packets. Each packet has some control instructions to process the data.
- Message Switching - In message switching each node receives and stores data in a small memory called buffer. Next, the switch looks for another link of the router for forwarding the message. This link is selected by the routing. While some link is busy, the message is stored in the buffer space providing a queue priority for the message inside the buffer.
Thus, option 4 is the correct answer.
Computer Networks Question 9:
The identification given to a computer connection to a network is known as
Answer (Detailed Solution Below)
Computer Networks Question 9 Detailed Solution
The correct answer is IP address.
Key Points
- IP address
- An IP address is a unique address that identifies the device on the internet or a local network.
- IP stands for the Internet Protocol which is having the set of rules governing the format of data sent via the internet or local network.
- This is differentiated into different classes based on the width.
- Process ID (PID)
- This is a unique number that helps in identifying a hardware product or a registered software product.
- It identifies each running process in an operating system.
- SYSID
- The SYSID file records the network interface addresses that the File Server registers in the volume location Database for the local file server machine.
- Each time the File Server restarts, it builds a list of interfaces on the local machine by reading the /usr/afs/local/NetInfo file, if it exists.
- Conclusion:
- IP address is the identification number given to the computer connected to a network .
Computer Networks Question 10:
In comparison to secondary storage, the primary storage is:
Answer (Detailed Solution Below)
Computer Networks Question 10 Detailed Solution
Computer stores data on specific memory depending on the importance of that data in processing, frequency of uses of that data, and volume of data being stored. There are two types of memory have been discussed Primary memory and secondary memory:
Primary Memory |
Secondary Memory |
|
|