Computer Networks MCQ Quiz in मल्याळम - Objective Question with Answer for Computer Networks - സൗജന്യ PDF ഡൗൺലോഡ് ചെയ്യുക

Last updated on Mar 16, 2025

നേടുക Computer Networks ഉത്തരങ്ങളും വിശദമായ പരിഹാരങ്ങളുമുള്ള മൾട്ടിപ്പിൾ ചോയ്സ് ചോദ്യങ്ങൾ (MCQ ക്വിസ്). ഇവ സൗജന്യമായി ഡൗൺലോഡ് ചെയ്യുക Computer Networks MCQ ക്വിസ് പിഡിഎഫ്, ബാങ്കിംഗ്, എസ്എസ്‌സി, റെയിൽവേ, യുപിഎസ്‌സി, സ്റ്റേറ്റ് പിഎസ്‌സി തുടങ്ങിയ നിങ്ങളുടെ വരാനിരിക്കുന്ന പരീക്ഷകൾക്കായി തയ്യാറെടുക്കുക

Latest Computer Networks MCQ Objective Questions

Top Computer Networks MCQ Objective Questions

Computer Networks Question 1:

What are the two basic types of attacks ?

  1. Active
  2. Passive
  3. DoS
  4. Both 1 and 2
  5. None of the above

Answer (Detailed Solution Below)

Option 4 : Both 1 and 2

Computer Networks Question 1 Detailed Solution

Concept:

A cyber-attack is exploitation of computer systems and networks. It uses malicious code to alter computer code, logic, or data and leads to cybercrimes, such as information and identity theft.

  • Active attacks: An Active attack attempts to alter system resources or affect their operations. The active attack involves some modification of the data stream or creation of the false statement
  • Passive attacks: A Passive attack attempts to learn or make use of information from the system but does not affect system resources. Passive Attacks are in the nature of eavesdropping on or monitoring of transmission. The goal of the opponent is to obtain information is being transmitted. 

Computer Networks Question 2:

Match the following:                                                              

List – A

List – B

(a) Connects a very large number of devices and spans across a dispersed geographical location covering many cities.                         

(i) Topology

(b) Encrypted communication tunnels with access   control and user authentication

(ii) Wi-Fi

(c) Physical or geometric arrangement of the network influenced by the physical connections of links and nodes.

(iii) Wide Area Network

(d) Local area network technology that sends communication through radio frequency signals.

(iv) Virtual Private Network

Codes:

  1. a-iii, b-i, c-iv, d-ii
  2. a-iv, b-iii, c-i, d-ii
  3. a-iii, b-iv, c-ii, d-i
  4. a-iii, b-iv, c-i, d-ii

Answer (Detailed Solution Below)

Option 4 : a-iii, b-iv, c-i, d-ii

Computer Networks Question 2 Detailed Solution

A computer network is a group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing. There are a number of devices and features associated with the computer network system. The following table will help us to understand the meaning, concept, and examples of the given network systems.

Topic Description
Topology
  • Topology is the mathematical study of the properties that are preserved through deformations, twistings, and stretchings of objects. Tearing, however, is not allowed.
  • A circle is topologically equivalent to an ellipse (into which it can be deformed by stretching) and a sphere is equivalent to an ellipsoid.
  • The physical or geometric arrangement of the network influenced by the physical connections of links and nodes.
Wi-Fi
  • The local area network technology that sends communication through radio frequency signals is called "Wireless LAN" or "Wi-Fi" (Wireless Fidelity).
  • It allows devices to connect to a network without the need for physical wired connections, using radio waves to transmit data over the air.
  • Wi-Fi is widely used in homes, offices, public places, and various other environments to enable wireless connectivity and internet access.
Wide Area Network
  • A wide area network (WAN) is a telecommunications network that extends over a large geographic area for the primary purpose of computer networking. 
  • Wide area networks are often established with leased telecommunication circuits.
  • Connects a very large number of devices and spans across a dispersed geographical location covering many cities
Virtual Private Network
  • VPNs aren't just for desktops or laptops, one can set up a VPN on your iPhone, iPad, or Android phone, too.
  • When you use a VPN, it can hide your IP address and physical location while encrypting your internet traffic so that no one can tell what you're doing online
  • Encrypted communication tunnels with access control and user authentication


Therefore Option 4 is the correct answer.

Computer Networks Question 3:

The identification given to a computer connection to a network is known as

  1. Process ID
  2. IP address
  3. SYSID
  4. System Serial number

Answer (Detailed Solution Below)

Option 2 : IP address

Computer Networks Question 3 Detailed Solution

Concept:

Process ID (PID)

This is a unique number that helps in identifying a hardware product or a registered software product.

It identifies each running processes in an operating system.

IP address

An IP address is a unique address that identifies the device on the internet or a local network.

  • IP stands for the Internet Protocol which is having the set of rules governing the format of data sent via internet or local network.
  • This is differentiated into different classes based on the width.

SYSID

The SYSID file records the network interface addresses that the File Server registers in the volume location Database for the local file server machine.

Each time the File Server restarts, it builds a list of interfaces on the local machine by reading the /usr/afs/local/NetInfo file, if it exists.

Conclusion:

IP address is the identification number given to the computer connection to a network .

Computer Networks Question 4:

Consider the following statements concerning e-governance and technology:

1. Rich Site Summary (RSS) is not a very useful tool for working on Web-service technology

2. Myspace is one of the most visited networks in the world

3. Facebook.com is not the most useful social networking site of choice for most students

4. Wiki- is a group collaboration software tool working on Web-service technology

Which of the above statements are correct?

  1. 1 and 4
  2. 2 and 4
  3. 1 and 3
  4. 2 and 3

Answer (Detailed Solution Below)

Option 2 : 2 and 4

Computer Networks Question 4 Detailed Solution

RSS (Rich Site Summary):

  • RSS (Rich Site Summary) is a format for delivering regularly changing web content.
  • Many news-related sites, weblogs, and other online publishers syndicate their content as an RSS Feed to whoever wants it.
  • The benefits of RSS include solving a problem for people who regularly use the web. It allows a user to easily stay informed by retrieving the latest content from the sites you are interested in.
  • It saves time by not needing to visit each site individually. It also ensures privacy,
  • Rich Site Summary (RSS) is actually a very useful tool for working on Web-service technology.

Myspace:

  • Myspace is an American social networking service. 
  • From 2005 to 2008, it was the largest social networking site in the world, reaching more than 100 million users per month.
  • Myspace had a significant influence on technology, pop culture, and music

Facebook:

  • Facebook is the biggest social media site, with more than two billion people using it every month.
  • There are more than 65 million businesses using Facebook Pages and more than six million advertisers actively promoting their business on Facebook, which makes it pretty safe as well.
  • It is the most useful social networking site of choice for most students.

WikiWikis can be used when geographically dispersed team members need to collaborate. The wiki format is good for adding information and getting feedback from team members 

Computer Networks Question 5:

Which of the following technique(s) used in networking?

  1. Circuit switching
  2. Message switching
  3. All of the options
  4. Packet switching

Answer (Detailed Solution Below)

Option 3 : All of the options

Computer Networks Question 5 Detailed Solution

Switching techniques:

  1. Switched communication networks are those in which data transferred from source to destination is routed between various intermediate nodes. 
  2. Switching is the technique by which nodes control or switch data to transmit it between specific points on a network.
  3. The switch is a mechanism that makes it possible to interconnect links to form a large network. 
  4. Generally, switches have some input ports and output ports.
  5. The number of ports in a switch is limited to less than five in normal cases. 
  6. The role of a switch in a network is to receive messages, data, packets from one link connected to the switch and transmit the received information to some other node connected to the switch by another link.

 

There are 3 common switching techniques:

1. Circuit Switching - In the circuit switching, between two nodes there is a dedicated channel for the transmission of data. The circuit is dedicated between two nodes the channel guaranty the full bandwidth of the channel for the transmission. The circuit switching is mainly used for voice circuits.

2. Packet Switching - In this switching data are passed as several small packets. These packets are the small portion of the larger message broken into small packets. Each packet has some control instructions to process the data.

3. Message Switching - In message switching each node receives and stores data in a small memory called buffer. Next, the switch looks for another link of the router for forwarding the message. This link is selected by the routing. While some link is busy, the message is stored in the buffer space providing a queue priority for the message inside the buffer.

Thus, option 4 is the correct answer.

Computer Networks Question 6:

The computer software that runs a computer, including scheduling tasks, managing storage and handling communication with peripherals is called:

  1. Bluetooth Technology
  2. Operating System
  3. Application Suite
  4. Device Driver

Answer (Detailed Solution Below)

Option 2 : Operating System

Computer Networks Question 6 Detailed Solution

The computer software that runs a computer, including scheduling tasks, managing storage, and handling communication with peripherals is called an Operating System. 

A computer’s operating system is a group of programs designed to serve two basic purposes:

  • To control the allocation and use of the computing system’s resources among the various users and tasks, and
  • To provide an interface between the computer hardware and the programmer that simplifies and makes feasible the creation, coding, debugging, and maintenance of application programs

An effective operating system should accomplish the following functions:

  • Should act as a command interpreter by providing a user-friendly environment.
  • Should facilitate communication with other users.
  • Facilitate the directory/file creation along with the security option.
  • Assure that when there are several active processes in the computer, each will get fair and non-interfering access to the central processing unit for execution.
  • Take care of storage and device allocation.
  • Provide for long term storage of user information in the form of files.
  • Permit system resources to be shared among users when appropriate, and be protected from unauthorized or mischievous intervention as necessary

NOTE: 

  • Bluetooth Technology: It was developed in order to connect two devices without wires. The range in which Bluetooth technology works is 10 meters (or 30 feet approx) only. 
  • A device driver manages communication with a specific Input-Output device by converting a logical request from a user into specific commands directed to the device.
  • Application Suite is a set of software programs with related functions. for example word processing, email applications, and spreadsheets, etc.

Computer Networks Question 7:

Which of the following technique(s) used in networking?

  1. Packet switching 
  2. Circuit switching
  3. Message switching
  4. All of the options

Answer (Detailed Solution Below)

Option 4 : All of the options

Computer Networks Question 7 Detailed Solution

The correct answer is All of the options

Key Points

Switching techniques:

  • Switched communication networks are those in which data transferred from source to destination is routed between various intermediate nodes. 
  • Switching is the technique by which nodes control or switch data to transmit it between specific points on a network.
  • The switch is a mechanism that makes it possible to interconnect links to form a large network. 
  • Generally, switches have some input ports and output ports.
  • The number of ports in a switch is limited to less than five in normal cases. 
  • The role of a switch in a network is to receive messages, data, packets from one link connected to the switch and transmit the received information to some other node connected to the switch by another link.
     

There are 3 common switching techniques:

  1. Circuit Switching - In the circuit switching, between two nodes there is a dedicated channel for the transmission of data. The circuit is dedicated between two nodes the channel guaranty the full bandwidth of the channel for the transmission. The circuit switching is mainly used for voice circuits.
  2. Packet Switching - In this switching data are passed as several small packets. These packets are the small portion of the larger message broken into small packets. Each packet has some control instructions to process the data.
  3. Message Switching - In message switching each node receives and stores data in a small memory called buffer. Next, the switch looks for another link of the router for forwarding the message. This link is selected by the routing. While some link is busy, the message is stored in the buffer space providing a queue priority for the message inside the buffer.

Thus, option 4 is the correct answer.

Computer Networks Question 8:

The identification given to a computer connection to a network is known as

  1. Process ID
  2. IP address
  3. SYSID
  4. Network Id

Answer (Detailed Solution Below)

Option 2 : IP address

Computer Networks Question 8 Detailed Solution

The correct answer is IP address.

Key Points

  • IP address
    • An IP address is a unique address that identifies the device on the internet or a local network.
    • IP stands for the Internet Protocol which is having the set of rules governing the format of data sent via the internet or local network.
    • This is differentiated into different classes based on the width.
  • Process ID (PID)
    • This is a unique number that helps in identifying a hardware product or a registered software product.
    • It identifies each running process in an operating system.
  • SYSID
    • The SYSID file records the network interface addresses that the File Server registers in the volume location Database for the local file server machine.
    • Each time the File Server restarts, it builds a list of interfaces on the local machine by reading the /usr/afs/local/NetInfo file, if it exists.
  • Conclusion:
  • IP address is the identification number given to the computer connected to a network .

Computer Networks Question 9:

In comparison to secondary storage, the primary storage is:

  1. Slower and lesser expensive
  2. Faster and more expensive
  3. Faster and lesser expensive
  4. Slower and more expensive

Answer (Detailed Solution Below)

Option 2 : Faster and more expensive

Computer Networks Question 9 Detailed Solution

Computer stores data on specific memory depending on the importance of that data in processing, frequency of uses of that data, and volume of data being stored. There are two types of memory have been discussed Primary memory and secondary memory:

Primary Memory

Secondary Memory

  • Expensive and fast
  • Situated inside a computer in the form of an integrated chip (IC),
  • Data is stored and retrieved within certain time regardless of the location of data in the memory,
  • Closely connected to the processor,
  • Examples are RAM (Random Access Memory) and ROM (Read Only Memory)
  • Low cost and slow in speed
  • Do not connect to the processor directly. Data is first transfers to main memory and then to the processor,
  • Use to store a large amount of information,
  • Examples are hard-disk, CD-ROM, DVD-ROM, Floppy Disk, Optical Disk, Flash Drive (pen drive), and magnetic tape.

Computer Networks Question 10:

Which of the following statements A-E about firewalls in computer networks are true?

(A) Firewalls are only available as hardware devices and only examine traffic entering a network.

(B) Firewalls allow a user to set rules for network traffic.

(C) Firewalls will automatically stop all malicious traffic.

(D) Firewalls backup all data that is transmitted around a network.

(E) Firewalls can be used to block access to certain websites.

Choose the correct answer from the options given below:

  1. (A), (C) and (D) Only
  2. (B) and (E) Only
  3. (B), (D) and (E) Only
  4. (A) and (C) Only

Answer (Detailed Solution Below)

Option 2 : (B) and (E) Only

Computer Networks Question 10 Detailed Solution

The correct answer is: B) and (E) Only

Key Points B) Firewalls allow a user to set rules for network traffic.

  • Firewalls typically allow administrators to define rules that specify which types of traffic are allowed to enter or leave the network. For example, a rule could be created to allow all web traffic but block all file-sharing traffic.

(E) Firewalls can be used to block access to certain websites.

  • Firewalls can be used to block access to specific websites or domains. This is often done to prevent users from accessing inappropriate or malicious content.

(A) Firewalls are only available as hardware devices and only examine traffic entering a network.

  • This statement is false. Firewalls can be implemented as either hardware or software, and they can examine both incoming and outgoing traffic.

(C) Firewalls will automatically stop all malicious traffic.

  • This statement is false. Firewalls cannot automatically stop all malicious traffic. They can only block traffic that matches the rules that have been defined by the administrator.

(D) Firewalls backup all data that is transmitted around a network.

  • This statement is false. Firewalls do not typically have the ability to backup data.
Get Free Access Now
Hot Links: teen patti master 51 bonus lotus teen patti teen patti master game