Computer Network Questions for IBPS RRB PO and Clerk Mains 2019

  • 1. Communication channel is shared by all the machines on the network in:
   A.) broadcast network
   B.) unicast network
   C.) multicast network
   D.) Internet Protocol Address

Answer: Option 'A'

Broadcast networks: It has a single communication channel that is shared by all the machines on the network. Short messages, called packets in certain contexts, sent by any machine are received by all the others.

  • 2. Bluetooth is an example of:
   A.) local area network
   B.) personal area network
   C.) virtual private network
   D.) wide area network

Answer: Option 'B'

A personal area network (PAN) is a computer network used for data transmission amongst devices such as computers, telephones, tablets and personal digital assistants. Bluetooth is an example of the same.

  • 3. A list of protocols used by a system, one protocol per layer, is called: 
   A.) protocol architecture
   B.) protocol stack
   C.) protocol suit
   D.) protocol application

Answer: Option 'B'

A protocol stack refers to a group of protocols that are running concurrently that are employed for the implementation of network protocol suite.

  • 4. In which of the following scenarios does Network congestion occur?
   A.) in case of a node termination
   B.) when a system terminates
   C.) when connection between two nodes terminates
   D.) in case of traffic overloading

Answer: Option 'D'

Network congestion occurs when a network node is carrying more data than it can handle. That is typically due to traffic overloading.

  • 5. Which among the following refers to the physical or logical arrangement of network?
   A.) Topology
   B.) Routing
   C.) Networking
   D.) Subnetting

Answer: Option 'A'

Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. Essentially, it is the topological structure of a network and may be depicted physically or logically.

  • 6. Which among the following topology requires multipoint connection?
   A.) Star
   B.) Mesh
   C.) Ring
   D.) Bus

Answer: Option 'D'

The point-to-point and Multipoint are two types of line configuration. Both describe a method to connect two or more communication devices in a link. Multipoint connection is used in BUS Topology. All the devices are connected to a single transmission medium, which acts as the Backbone of the connection.

  • 7. Encryption and Decryption are the functions of __________ layer.
   A.) transport
   B.) session
   C.) presentation
   D.) physical

Answer: Option 'C'

Encryption and Decryption are the functions of the presentation layer.

  • 8. Which of the following describe router functions?
   A.) Packet switching
   B.) Packet filtering
   C.) Internetwork communication
   D.) All of the above

Answer: Option 'D'

 All of the given options are router functions.

  • 9. Which physical layer devices can be used to enlarge the area covered by a single LAN segment?
    1. Switch
    2. NIC
    3. Hub
    4. Repeater
    5. RJ45 transceiver
   A.) 1 only
   B.) 1 and 3
   C.) 3 and 4
   D.) 5 only

Answer: Option 'C'

A repeater operates at the physical layer. Its job is to regenerate the signal over the same network before the signal becomes too weak or corrupted to extend the length to which the signal can be transmitted over the same network.  A hub is basically a multiport repeater. A hub connects multiple wires coming from different branches, for example, the connector in star topology which connects different stations.

  • 10. What does MAN stands for?
   A.) Micro area network
   B.) Metropolitan area network
   C.) Macro area network
   D.) Mix area network

Answer: Option 'B'

MAN is abbreviation for Metropolitan Area Network.

  • 11. How long is an IPv6 address?
   A.) 32 bits
   B.) 128 bytes
   C.) 64 bits
   D.) 128 bits

Answer: Option 'D'

IPv6 address is 128 bits long.

  • 12. By an intranet we mean:
   A.) a LAN of an organization
   B.) a Wide Area Network connecting all branches of an organization
   C.) a corporate computer network
   D.) a network connecting all computers of an organization and using the internet protocol

Answer: Option 'D'

An intranet is a private network accessible only to an organization's staff.

  • 13. What is a Firewall in Computer Network?
   A.) The physical boundary of Network
   B.) An operating System of Computer Network
   C.) A system designed to prevent unauthorized access
   D.) A web browsing Software

Answer: Option 'C'

A firewall is a network security system designed to prevent unauthorized access to or from a private network.

  • 14. Which among the following term is used for those hardware devices that are not part of the main computer system and are often added later to the system?
   A.) clip art
   B.) highlight
   C.) execute
   D.) peripheral

Answer: Option 'D'

A peripheral device is generally defined as any auxiliary device such as a computer mouse or keyboard that connects to and works with the computer in some way.

  • 15. What is Direct X?   
   A.) Operating system
   B.) Software that drives graphics hardware to enable game and multimedia to your system
   C.) Web browser
   D.) Word processing software

Answer: Option 'B'

Microsoft DirectX is a collection of application programming interfaces (APIs) for handling tasks related to multimedia, especially game programming and video, on Microsoft platforms.

  • 16. Which of the following was used to program the first computer?
   A.) High Level language
   B.) Machine language
   C.) Source code
   D.) Object code

Answer: Option 'B'

Earliest computers used Machine language.

  • 17. Which of the following menu types is also called a drop-down menu?
   A.) fly-list
   B.) go-up
   C.) pull-down
   D.) pop-down

Answer: Option 'C'

Drop Down menu is also called drop down list or pull-down list.

  • 18. What is a spooler? 
   A.) Type of printer
   B.) Peripheral device
   C.) Program
   D.) Output device 

Answer: Option 'C'

Spooler is a program in computing that is used to line up print jobs by storing them in the buffer for a short time and allows the printer to print at the time when it is use.  

  • 19. What is the diagnostic testing sequence of a computer called that determines if all input and output devices are properly working?  
   A.) rebooting
   B.) defragmentation
   C.) scanning
   D.) POST

Answer: Option 'D'

POST is a diagnostic testing sequence of a computer that is run before the actual booting to ensure that the computer hardware is functioning well. It stands for ‘Power-On Self-Test’.

  • 20. Which of the following components represent the parts of a Central Processing Unit(CPU)?
   A.) Input, output and processing
   B.) Control unit, primary storage and secondary storage
   C.) Control unit, arithmetic logic unit and primary storage
   D.) Control unit, processing and primary storage

Answer: Option 'C'

Control unit, arithmetic-logic unit and primary storage are the parts of the CPU. The storage unit deals with the allocation of memory to the processed data, the Control Unit (CU) controls the flow and processing of the data and the Arithmetic Logic Unit (ALU) carries out the arithmetic operations of calculations of the computer system. 

  • 21. Which among the following is a type of device that is used for identifying people by their unique characteristics?
   A.) biometric device
   B.) Web camera
   C.) joystick
   D.) scanner

Answer: Option 'A'

A biometric device is a type of device that records the unique characteristics such as finger prints because it is impossible to have two different persons with the same fingers prints.

  • 22. Which among the following is software application commonly used to prepare a presentation/slide show?
   A.) Adobe
   B.) Power Point
   C.) Outlook Express
   D.) Internet Explorer

Answer: Option 'B'

PowerPoint is used to make presentations/slide shows.

  • 23. A CD player can access data/information using which method?
   A.) Sequential access
   B.) Random access
   C.) Multivariate access
   D.) All of these

Answer: Option 'D'

All are memory access mechanism which a CD Player can use.

  • 24. Which of the following specialized programs is used in locating information on the Web?
   A.) Search engine
   B.) Information finder
   C.) Web browser
   D.) Search query

Answer: Option 'A'

The search engine searches the Internet for the information you want and displays it on your computer screen. Some popular search engines are Google, Yahoo, Bing, Ask, AOL, Look Smart, and Netscape Search.

  • 25. Which is of the following terms is used for unsolicited e-mail?
   A.) News Group
   B.) Usenet
   C.) Backbone
   D.) Spam

Answer: Option 'D'

Spam is unsolicited e-mail that is mostly sent by an electronic messaging system used by various commercial organizations to send bulk messages to a large number of addresses.

Computer Network Questions for IBPS RRB Download Pdf