Home Tuitions

CUET CS Chapter-Communication and Networking Concepts 

Board CBSE
Textbook NCERT
Class Class 12
Subject Computer Science
Chapter CUET CS Chapter-Communication and Networking Concepts 
Chapter Name Communication and Networking Concepts
Category CUET (Common University Entrance Test) UG

MCQ-Based Questions for CUET Computer Science Chapter-Communication and Networking Concepts 

This page is prepared by HT experts and consists of MCQ-Based Questions for the CUET Computer Science chapter-Communication and Networking Concepts with a detailed explanation of all the questions asked from Communication and Networking Concepts. To find the solution to the MCQ questions click on the answer tab. Check out chapter-wise CUET computer science Practice MCQ Based Questions. 

Practice Questions for CUET Computer Science chapter-Communication and Networking Concepts SET-1

Computer Science - MCQ on Communication and Networking Concepts

Class XII

Q.1 The disadvantage of bus topology is

a) long cable length.

b) complexity.

c) centralization.

d) fault diagnosis problem.

Answer:

(d)

Explanation: Although the bus topology is very simple, but in this topology fault detection is very difficult.

Q.2 The advantage of bus topology is

a) short cable length.

b) centralization.

c) fault diagnosis.

d) use of hub.

Answer:

(a)

Explanation: Bus topology has a short cable length because there is a single common path connecting all the nodes.

Q.3 LAN stands for

a) Large Application Number.

b) Large Authorized Network.

c) Local Area Network.

d) Large Authorization Network.

Answer:

(c)

Explanation: A Local Area Network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport.

Q.4 OSI stands for

a) Operating System Interconnection.

b) Open Source Interconnection.

c) Open Systems Interconnections.

d) Operating Area Interconnections.

Answer:

(c)

Explanation: The Open Systems Interconnection Reference Model (OSI Reference Model or OSI Model) is an abstract description for layered communications and computer network protocol design.

Q.5 FTP stands for

a) File Transfer Protocol.

b) File Transaction Protocol.

c) Folder Time Delay.

d) Function Transfer Part.

Answer:

(a)

Explanation: File Transfer Protocol (FTP) is the name of a special set of protocols used by computers connected over the Internet to transfer files.

Q.6 The disadvantage of optical fibers is that it is

a) affected by noise distortion.

b) costly.

c) not good in quality.

d) harmful to use.

Answer:

(b)

Explanation: The main disadvantage of the optical fiber cable is that it is very costly.

Q.7 The advantage of optical fibers is that it is

a) cheap.

b) minimum cost of installation.

c) hardware compatibility.

d) free from disturbances.

Answer:

(d)

Explanation: The advantage of optical fibers is that it is free from any type of disturbances like noise distortion.

Q.8 WAN stands for

a) Wide Area Network.

b) World Action Number.

c) Wide Action Normalization.

d) World Area Network.

Answer:

(a)

Explanation: Wide Area Network (WAN) is a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries)

Q.9 WWW stands for

a) World Wide Workshop.

b) World Wide Web.

c) World Wide Warehouse.

d) World Wide Workstation.

Answer:

(b)

Explanation: The World Wide Web (commonly abbreviated as "the Web") is an elaborate set of interlinked hypertext documents accessed via the Internet.

Q.10 ARPANET is a research work sponsored by the

a) DoD.

b) Ddo.

c) Odd.

d) ODD.

Answer:

(a)

Explanation: The ARPANET (Advanced Research Projects Agency Network) developed by ARPA of the United States Department of Defense (DoD) during the Cold War, was the world's first operational packet switching network, and the predecessor of the global Internet.

Q.11 NFS stands for

a) Network Folder Specification.

b) Notification Fact System.

c) Network File System.

d) Network and Firewall System.

Answer:

(c)

Explanation: NFS (Network File System) allows computers to share files across a network.

Q.12 A tool which tries to locate files in public FTP archives is

a) Gopher.

b) MOSAIC.

c) Archie.

d) Telnet.

Answer:

(c)

Explanation: Archie is a tool for indexing FTP archives, allowing people to find specific files. It is considered to be the first Internet search engine.

Q.13 The two classifications of servers are

a) public and private.

b) bounded and unbounded.

c) dedicated and non-dedicated.

d) enabled and locked.

Answer:

(c)

Explanation: A server may be dedicated or non-dedicated. Dedicated servers are used only as a server, not as a workstation. Non-dedicated servers are used both as a server and a workstation.

Q.14 WAIS stands for

a) Wide Area Information Server.

b) World Area Info-system.

c) World of Automated Server.

d) Wide Automatic System.

Answer:

(a)

Explanation: WAIS (Wide Area Information Servers) is an Internet system in which specialized subject databases are created at multiple server locations, kept track of by a directory of servers at one location, and made accessible for searching by users with WAIS client programs.

Q.15 TAP stands for

a) Transfer Action Position.

b) Transformation of Active Point.

c) Terminal Access Point.

d) Termination Action Process.

Answer:

(c)

Explanation: TAP stands for Terminal Access Point.

Q.16 NIU stands for

a) Nested Interactive Unit.

b) Nested Internet Unit.

c) Network Interactive Unit.

d) Network Interface Unit.

Answer:

(d)

Explanation: NIU stands for Network Interface Unit. It helps to establish communication between the server and the workstations.

Q.17 A protocol that allows a computer to use the internet protocol with a standard voice-grade telephone line and a high-speed modem, is known as

a) SLIP.

b) WLL.

c) XML.

d) MOSAIC.

Answer:

(a)

Explanation: The Serial Line Internet Protocol (SLIP) is a mostly obsolete encapsulation of the Internet Protocol designed to work over serial ports and modem connections.

Q.18 A program that allows to search the files of the internet Gopher servers for a particular search string, is known as

a) Archie.

b) Veronica.

c) WAIS.

d) cracker.

Answer:

(b)

Explanation: Veronica is a search engine system for the Gopher protocol, developed in 1992 by Steven Foster and Fred Barrie at the University of Nevada, Reno.

Q.19 A program used to block the transmission of files ‘infected’ by a virus, is known as

a) firewall.

b) cyber wall.

c) virus wall.

d) archie wall.

Answer:

(c)

Explanation: A Virus Wall is a program used to block the transmission of files "infected" by a Virus. It is usually implemented as a WWW Proxy or Mail Relay. A Virus Wall may be considered to be a part of a Firewall.

Q.20 A computer on the network, which provides services to users or other computers on that network, is known as

a) 3G

b) cookie.

c) archie.

d) host.

Answer:

(d)

Explanation: Host System’s usually run a multi-user operating system such as Unix, MVS or VMS, or at least an operating system with network services such as Windows NT, NetWare NDS or NetWare Bindery.

Q.21 CDMA stands for

a) Character Desktop Main Area.

b) Code Durability Main Access.

c) Character Division Multiple Access.

d) Code Division Multiple Access.

Answer:

(d)

Explanation: Code Division Multiple Access (CDMA) is a channel access method utilized by various radio communication technologies.

Q.22 WLL stands for

a) Wired Local Lance.

b) World Local Loop.

c) Wired Local Loop.

d) Wireless Local Loop.

Answer:

(d)

Explanation: Wireless Local Loop (WLL), is a term for the use of a wireless communications link as the "last mile / first mile" connection for delivering plain old telephone service (POTS) and/or broadband Internet to telecommunications customers.

Q.23 GSM stands for

a) Great System Magic.

b) Global System Mark.

c) Great Source Of Management.

d) Global System Mobile.

Answer:

(d)

Explanation: GSM is the most popular standard for mobile phones in the world. Its promoter, the GSM Association, estimates that 80% of the global mobile market uses the standard.

Q.24 The capacity of a medium to transmit a signal is called

a) frequency.

b) bandwidth.

c) baud rate.

d) wavelength.

Answer:

(b)

Explanation: Bandwidth is a measure of available or consumed data communication resources expressed in bits.

Computer Science - MCQ on Communication and Network Concepts

Class XII

Q.1 A device, which connects dissimilar networks, is known as

a) backbone.

b) internet.

c) LAN.

d) gateway.

Answer:

(d)

Explanation: In internet, most computers are connected to smaller networks, which in turn are connected through gateways to the internet backbone.

Q.2 A central interconnecting structure that connects one or more networks just like the trunk or the spine of human being is known as

a) backbone.

b) internet.

c) LAN.

d) gateway.

Answer:

(a)

Explanation: A backbone is a part of computer network infrastructure that interconnects various pieces of network, providing a path for the exchange of information between different LANs or sub-networks.

Q.3 ARPANET stands for

a) Advanced Resource Planning Agency Network.

b) Advanced Research Project Agency Network.

c) Advanced Research Planning Agency Network.

d) Actual Resource Planning Agency Network.

Answer:

(b)

Explanation: ARPANET stands for Advanced Research Project Agency Network. The goal of this project was to connect computers at different universities and U.S. defense.

Q.4 The communication set of rules are known as

a) ARPANET.

b) NSFnet.

c) Protocols.

d) Gateway.

Answer:

(c)

Explanation: In internet, many smaller networks are connected and allows all the computers to exchange information with each other. This is possible through rules set for communication, called protocols.

Q.5 Communication protocol used by internet is known as

a) TCP/IP.

b) UDP.

c) HTTP.

d) FTTP.

Answer:

(a)

Explanation: Communication protocol used by internet is known asTCP/IP. The TCP part is responsible for dividing the file into packets on the source computer. The IP part is responsible for handling the address of destination computer.

Q.6 An interpreter that helps establish communication between the server and workstations is known as

a) NIU.

b) Nodes.

c) circuit switching.

d) packet switching.

Answer:

(a)

Explanation: The NIU (Network Interface Unit) is a device that is attached to each of the workstations and server. It helps the workstation to establish the all-important connection with the network.

Q.7 The physical address assigned by NIC manufacturer is called

a) MAC address.

b) Node address.

c) NIU address.

d) Network address.

Answer:

(a)

Explanation: The NIC manufacturer assigns a unique physical address to each NIC card. This physical address is known as MAC address.

Q.8 All the following are switching techniques except

a) network switching.

b) message switching.

c) packet switching.

d) circuit switching.

Answer:

(a)

Explanation: A network switch is a computer-networking device that connects network segments.

Q.9 Store and forward principle applies to

a) message switching.

b) circuit switching.

c) packet switching.

d) network switching.

Answer:

(a)

Explanation: Store and forward principle applies to message switching. Data is stored first in buffer and then delivered to the destination.

Q.10 All of the following are unguided medium except

a) satellite.

b) microwaves.

c) radiowaves.

d) cables.

Answer:

(d)

Explanation: Guided media use a cabling system that guides the data signals along a specific path.

Q.11 All of the following are guided media except

a) twisted pair.

b) coaxial cable.

c) optical fibre.

d) radiowaves.

Answer:

(d)

Explanation: Radiowaves are electromagnetic waves occurring on the radio frequency portion of the electromagnetic spectrum.

Q.12 The bleeding of signal from one wire to another, which can corrupt signal and cause network error is known as

a) IC talk.

b) crosstalk.

c) corrupt talk.

d) interrelated talk.

Answer:

(b)

Explanation: Any phenomenon by which a signal transmitted on one circuit or channel of transmission system creates an undesirable effect in another circuit or channel is known as crosstalk. It is caused by capacitive, inductive or conducting coupling from one circuit to another.

Q.13 The coaxial cables are of

a) one type.

b) two types.

c) three types.

d) four types.

Answer:

(b)

Explanation: There are two types of coaxial cables: Thicknet and Thinnet cables.

Q.14 An internet facility that lets you log onto remote computer system is called

a) telnet.

b) www.

c) web hosting.

d) web browsing.

Answer:

(a)

Explanation: Telnet refers to software, which implements the client part of the protocol.

Q.15 The system of security, which uses fingerprints for identification is known as

a) biometric systems.

b) firewall.

c) encrypted smart card.

d) cookies.

Answer:

(a)

Explanation: In IT, biometrics refers to technologies that measure and analyze human body characteristics such as fingerprints, eye retinas, irises, voice patterns, facial patterns and hand measurements for authentication purposes.

Q.16 The system designed to prevent unauthorized access to or from, private networks is called

a) cookies.

b) biometric system.

c) encrypted smart card.

d) firewall.

Answer:

(d)

Explanation: A firewall is an integrated collection of security measures designed to prevent unauthorized access to a networked computer system.

Q.17 CDMA stands for

a) Code Duplication Multiple Access.

b) Character Division Multiple Access.

c) Code Division Multiple Access.

d) Character Duplication Multiple Access.

Answer:

(c)

Explanation: CDMA is a channel access method utilized by various radio communication technologies.

Q.18 The malicious programmers, who break into secure system, are known as

a) hackers.

b) crackers.

c) authenticators.

d) designers.

Answer:

(b)

Explanation: Cracker is a person, who breaks security, encryption or digital rights management scheme.

Q.19 Programmers, who gain knowledge about computer system for playful planks are known, as

a) authenticators.

b) hackers.

c) crackers.

d) designers.

Answer:

(b)

Explanation: A hacker is a person, who breaks into the system. He is enthusiastic home computer hobbyist.

Q.20 Thousand bits transmitted per second is known as

a) bps

b) Bps

c) Mps

d) Mps

Answer:

(a)

Explanation: Bit rate is the number of bits that are conveyed or processed per unit of time. The bit rate is quantified using the bits per second unit, often in conjunction with an SI prefix such as kilo, mega, giga or tera.

Q.21 Difference between the highest and lowest frequencies of a transmission channel is known as

a) baud.

b) amplitude.

c) frequency difference.

d) bandwidth.

Answer:

(d)

Explanation: Bandwidth is measure of available or consumed data communication resources expressed in bit or multiple of bits.

Q.22 The general-purpose specification for creating custom markup language is

a) XML

b) HTML

c) HTTP

d) FTTP

Answer:

(a)

Explanation: XML is extensible markup language, which allows user to define the mark-up elements.

Q.23 The standard, which forms the second-generation (2G) mobile phone system, is

a) GMSK

b) GPRS

c) ETSI

d) GSM

Answer:

(d)

Explanation: GSM (Global System for Mobiles) is so called as it differs from its predecessors in both signaling and speech channels are different.

Q.24 A large computer network that spans a metropolitan area or campus is known as

a) LAN

b) WAN

c) MAN

d) ZAN

Answer:

(c)

Explanation: A MAN is optimized for a larger geographical area than LAN, ranging from several blocks of building to entire cities.

Q.25 URI that specifies, where an identified resource is available and the mechanism for retrieving it is known as

a) URL.

b) resource detector.

c) UCL.

d) retrieval system.

Answer:

(a)

Explanation: URL (Uniform Resource Locator) is the global address of documents and other resources on the www. The first part of address is called a protocol identifier and second part is called a resource name.

Practice Questions for CUET Computer Science chapter-Communication and Networking Concepts SET-2

Q.26 The messages that a web server transmits to a web browser so that the web server can keep track of the user’s activity on a specific web site is known as

a) cookies.

b) firewall.

c) biometric systems.

d) smart cards.

Answer:

(a)

Explanation: Cookies are the parcels of text sent by a server to web client and then sent back unchanged by the client each time it accesses that server. HTTP cookies are used for authenticating session and maintaining specific information about users.

Q.27 All are types of firewalls except

a) packet filter.

b) proxy server.

c) circuit-level gateway.

d) TCP/IP.

Answer:

(d)

Explanation: TCP/IP is transmission control protocol/internet protocol used for communication purposes.

Q.28 An eight-wire connector, which is used to connect computers on LANs especially Ethernets is

a) RJ-45.

b) RJ-50.

c) RJ-55.

d) RJ-60.

Answer:

(a)

Explanation: The 8 position 8 contact (8P8C) plugs and sockets are most regularly used as Ethernet connector. They are typically used to terminate twisted pair cable.

Q.29 The pattern of interconnection of nodes in a network is called the

a) node connection.

b) topology.

c) topography.

d) nodal system.

Answer:

(b)

Explanation: Network topology is the study of the arrangements or mapping of the elements of a network, especially the physical and logical interconnection between nodes.

Q.30 All of the following are network topologies except

a) star.

b) bus.

c) ring.

d) circle.

Answer:

(d)

Explanation: There are different types of topologies such as star, bus, ring, mesh, graph. Circle is network of people related to cultural policies.

Q.31 The process of sending data on a wave is known as

a) modulation.

b) amplification.

c) frequency distribution.

d) crest formation.

Answer:

(a)

Explanation: Modulation is the process of varying a periodic waveform i.e. a tone, in order to use that signal to convey a message.

Q.32 Modulation techniques are of

a) one type.

b) two type.

c) three type.

d) four type.

Answer:

(c)

Explanation: There are 3 types of modulation techniques:

Amplitude Modulation.

Frequency Modulation.

Phase Modulation.

Q.33 A computer device that allows to connect and communicate with other computers via telephone lines is known as

a) modem.

b) gateway.

c) switch.

d) hub.

Answer:

(a)

Explanation: Modem is a device that modulates an analog carrier signal to encode digital information and also demodulates such a carrier signal to decode the transmitted information.

Q.34 A hardware device, which is used to connect various computers together, is known as

a) hub.

b) concentrator.

c) connector.

d) switch.

Answer:

(a)

Explanation: A hub is a small rectangular box, often made up of plastic that receives its power from an ordinary wall outlet. A hub joins multiple computers to form a single network segment.

Q.35 A device that provides a central connection point for cables from workstations, server, and peripherals is known as

a) Hub.

b) Concentrator.

c) Gateway.

d) Modem.

Answer:

(b)

Explanation: Concentrator is a device that connects a number of circuits, which are not used at once, to a smaller group of circuits for economy.

Q.36 The device that amplifies a signal being transmitted on the network is known as

a) bridge.

b) router.

c) repeater.

d) switch.

Answer:

(c)

Explanation: A repeater is an electronic device that receives a signal and retransmits it at a higher level, so that the signal can cover longer distances without degradation.

Q.37 A network device, which is used to connect two local networks with different types of cables, is known as

a) repeater.

b) bridge.

c) router.

d) gateway.

Answer:

(b)

Explanation: A bridge is a device that helps to link two networks together. They are smart enough to know which computers are on which side of the bridge, so they only allow those messages that need to get to the other side to cross the bridge.

Q.38 The characters based naming system by which servers are identified is known as

a) domain name system.

b) server name system.

c) character based system.

d) data based system.

Answer:

(a)

Explanation: DNS is a hierarchical naming system for computer, services or any resource participating in the internet. It also associates various information with domain names assigned to such participants.

Q.39 All of the following are different types of web hosting except

a) free hosting.

b) virtual hosting.

c) real hosting.

d) dedicated hosting.

Answer:

(c)

Explanation: Web hosting is a means of hosting web-server application on a computer system through which electronic content on the internet is readily available to any web-browser client.

Q.40 A two-way videophone conversation among multiple participants is called as

a) chatting.

b) video-conferencing.

c) multi-conferencing.

d) two-way crosstalk.

Answer:

(b)

Explanation: Video-conferencing is a set of interactive telecommunication technologies, which allow two or more location to interact via two-way video and audio transmission simultaneously.