{"id":17920,"date":"2025-11-10T11:28:14","date_gmt":"2025-11-10T11:28:14","guid":{"rendered":"https:\/\/mcqsadda.com\/?p=17920"},"modified":"2025-12-23T04:52:49","modified_gmt":"2025-12-23T04:52:49","slug":"data-communication-networking-100-mcqs-with-answer-and-explanation","status":"publish","type":"post","link":"https:\/\/mcqsadda.com\/index.php\/2025\/11\/10\/data-communication-networking-100-mcqs-with-answer-and-explanation\/","title":{"rendered":"Data Communication &amp; Networking 100 MCQs With Answer and Explanation"},"content":{"rendered":"\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">1. Data communication refers to:<\/mark><\/strong><br>A) Process of storing data<br>B) Process of transmitting data between devices<br>C) Process of securing data<br>D) Process of analyzing data<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  Data communication involves transferring digital or analog data between devices via transmission media.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">2. Which of the following is not a component of data communication?<\/mark><\/strong><br>A) Message<br>B) Sender<br>C) Receiver<br>D) Compiler<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: D <\/b><BR>\n<b>Explanation:<\/b>  The main components are message, sender, receiver, medium, and protocol.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">3. What does &#8220;protocol&#8221; mean in networking?<\/mark><\/strong><br>A) A set of rules for communication<br>B) A physical medium<br>C) A type of message<br>D) An error in communication<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  Protocols are standard rules that govern data transmission between devices.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">4. Which transmission mode allows data to be sent in both directions simultaneously?<\/mark><\/strong><br>A) Simplex<br>B) Half-duplex<br>C) Full-duplex<br>D) Multiplex<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b>  Full-duplex allows simultaneous two-way communication.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">5. Which device connects two different networks?<\/mark><\/strong><br>A) Switch<br>B) Hub<br>C) Router<br>D) Repeater<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b>  A router routes data packets between different networks.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>6. Which of the following is NOT a guided transmission medium?<\/strong><br><\/mark>A) Coaxial cable<br>B) Fiber optic cable<br>C) Twisted pair cable<br>D) Radio waves<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: D <\/b><BR>\n<b>Explanation:<\/b>   Radio waves are unguided (wireless) media.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>7. In networking, bandwidth refers to:<\/strong><br><\/mark>A) Size of data<br>B) Data transmission capacity of a channel<br>C) Delay in communication<br>D) Storage capacity<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  Bandwidth indicates maximum data rate supported by a medium.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">8. Which of the following uses light for data transmission?<br><\/mark><\/strong>A) Coaxial cable<br>B) Fiber optic cable<br>C) Twisted pair cable<br>D) Satellite<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  Fiber optics use light pulses to transmit data.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>9. Which layer of the OSI model deals with routing of data?<\/strong><br><\/mark>A) Data link layer<br>B) Network layer<br>C) Transport layer<br>D) Physical layer<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  Network layer handles logical addressing and routing of packets.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">10. Which OSI layer is responsible for error detection and correction?<\/mark><\/strong><br>A) Physical layer<br>B) Data link layer<br>C) Transport layer<br>D) Application layer<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  Data link layer ensures reliable node-to-node communication with error checking.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">11. In OSI model, which layer provides encryption and compression?<\/mark><\/strong><br>A) Session layer<br>B) Transport layer<br>C) Presentation layer<br>D) Network layer<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C  <\/b><BR>\n<b>Explanation:<\/b>  The presentation layer translates, compresses, and encrypts data.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">12. Which protocol is used to send emails?<\/mark><\/strong><br>A) HTTP<br>B) SMTP<br>C) FTP<br>D) SNMP<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  SMTP (Simple Mail Transfer Protocol) is used to send emails.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">13. Which protocol is used to retrieve emails?<\/mark><\/strong><br>A) FTP<br>B) POP3 \/ IMAP<br>C) SMTP<br>D) HTTP<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  POP3 and IMAP are used to retrieve emails from mail servers.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">14. IP address of version 4 (IPv4) is of:<\/mark><\/strong><br>A) 16 bits<br>B) 32 bits<br>C) 64 bits<br>D) 128 bit<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b> IPv4 addresses are 32-bit numerical addresses written in dotted decimal form.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">15. IPv6 addresses are:<\/mark><\/strong><br>A) 64-bit<br>B) 128-bit<br>C) 256-bit<br>D) 32-bit<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  IPv6 uses 128-bit addresses to provide a large address space.\n<\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">16. Which protocol is used for transferring files?<\/mark><\/strong><br>A) FTP<br>B) SMTP<br>C) SNMP<br>D) ICMP<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  FTP (File Transfer Protocol) transfers files over a network.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">17. Which network device operates at Data Link Layer?<\/mark><\/strong><br>A) Router<br>B) Switch<br>C) Hub<br>D) Gateway<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  A switch forwards data based on MAC addresses, operating at the Data Link Layer.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>18. Which of the following is NOT an application layer protocol?<\/strong><br><\/mark>A) HTTP<br>B) FTP<br>C) DNS<br>D) TCP<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: D <\/b><BR>\n<b>Explanation:<\/b>   TCP is a Transport layer protocol, not Application layer.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>19. Which topology has a single central cable to which all nodes are connected?<\/strong><br><\/mark>A) Star<br>B) Mesh<br>C) Bus<br>D) Ring<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b>  In bus topology, a single backbone cable connects all devices.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>20. Which topology connects each node directly to every other node?<\/strong><br><\/mark>A) Bus<br>B) Ring<br>C) Mesh<br>D) Star<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b>  Mesh topology provides dedicated links between each pair of nodes.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>21. In star topology, all computers are connected to:<\/strong><br><\/mark>A) Each other<br>B) A central hub or switch<br>C) Backbone cable<br>D) Router<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  Star topology requires a central device for communication.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>22. What is the main disadvantage of ring topology?<\/strong><br><\/mark>A) High cost<br>B) Failure of one node affects the whole network<br>C) Difficult to install<br>D) No central control<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  In a ring, if one computer or connection fails, it can break the communication path.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>23. Which of the following is a wireless communication technology?<\/strong><br><\/mark>A) Bluetooth<br>B) Wi-Fi<br>C) Infrared<br>D) All of the above<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: D <\/b><BR>\n<b>Explanation:<\/b> Bluetooth, Wi-Fi, and Infrared are wireless technologies.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>24. Which is the fastest wireless communication technology among these?<\/strong><br><\/mark>A) Bluetooth<br>B) Infrared<br>C) Wi-Fi<br>D) Ethernet<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b>  Wi-Fi provides higher data transfer rates than Bluetooth and Infrared.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>25. Which organization developed the OSI model?<\/strong><br><\/mark>A) IEEE<br>B) ISO<br>C) IETF<br>D) W3C<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>   International Organization for Standardization (ISO) developed the OSI reference model.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>26. Which of the following is a private IP address?<\/strong><br><\/mark>A) 192.168.1.1<br>B) 8.8.8.8<br>C) 172.33.10.5<br>D) 120.10.10.1<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  192.168.x.x is reserved for private networks.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>27. Which protocol is used to translate domain names into IP addresses?<\/strong><br><\/mark>A) HTTP<br>B) DNS<br>C) DHCP<br>D) SNMP<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  Domain Name System (DNS) resolves domain names into IP addresses.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>28. DHCP is used for:<\/strong><br><\/mark>A) Assigning IP addresses automatically<br>B) Sending emails<br>C) File transfer<br>D) Encryption<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  DHCP (Dynamic Host Configuration Protocol) assigns IP addresses dynamically.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>29. Which of the following is NOT a valid class of IPv4 addresses?<\/strong><br><\/mark>A) Class A<br>B) Class B<br>C) Class D<br>D) Class F<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: D <\/b><BR>\n<b>Explanation:<\/b>  IPv4 has classes A, B, C, D (multicast), and E (experimental). No Class F exists.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>30. In IPv4, the range of Class C addresses is:<\/strong><br><\/mark>A) 1\u2013126<br>B) 128\u2013191<br>C) 192\u2013223<br>D) 224\u2013239<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b>  Class C IP addresses range from 192.0.0.0 to 223.255.255.255.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>31. Which device works at the physical layer?<\/strong><br><\/mark>A) Switch<br>B) Repeater<br>C) Router<br>D) Gateway<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  Repeaters regenerate signals at the physical layer.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>32. Which protocol is used for secure communication over the web?<\/strong><br><\/mark>A) HTTP<br>B) HTTPS<br>C) FTP<br>D) TELNET<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  HTTPS uses SSL\/TLS for encrypted web communication.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>33. Which of the following is a connection-oriented protocol?<\/strong><br><\/mark>A) UDP<br>B) IP<br>C) TCP<br>D) ICMP<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b>  TCP ensures reliable, connection-oriented communication.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>34. Which of the following is a connectionless protocol?<\/strong><br><\/mark>A) TCP<br>B) UDP<br>C) FTP<br>D) HTTP<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b> UDP is connectionless and does not guarantee delivery.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">35. In TCP\/IP, IP provides:<\/mark><\/strong><br>A) Reliability<br>B) Routing and addressing<br>C) Encryption<br>D) Error recovery<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b> IP handles logical addressing and routing, not reliability.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>36. Which protocol is used to monitor and manage networks?<\/strong><br><\/mark>A) SMTP<br>B) SNMP<br>C) FTP<br>D) POP3<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  SNMP (Simple Network Management Protocol) is used for monitoring and management.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>37. Which of the following is NOT a wireless standard?<\/strong><br><\/mark>A) 802.11<br>B) 802.15<br>C) 802.3<br>D) Bluetooth<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b>  802.3 is Ethernet (wired). Wireless standards include 802.11 (Wi-Fi) and 802.15 (Bluetooth).\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>38. <strong>The first network<\/strong><\/strong><br><\/mark>A) NSFNET<br>B) ARPANET<br>C) ASPNET<br>D) None of these<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  Developed by the Advanced Research Projects Agency (ARPA) of the U.S. Department of Defense,\u00a0ARPANET became operational in\u00a01969.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>39. <strong>Data communication system within a building ___<\/strong><\/strong><br><\/mark>A) LAN<br>B) MAN<br>C) WAN<br>D) None of these<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A <\/b><BR>\n<b>Explanation:<\/b>  A\u00a0Local Area Network (LAN)\u00a0is a data communication system designed to connect computers and devices within a limited geographical area, such as a home, office, school, or a single building.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>40. Which of the following uniquely identifies a device on a local network?<\/strong><br><\/mark>A) IP address<br>B) Port number<br>C) MAC address<br>D) Subnet mask<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b>  A MAC address uniquely identifies a device\u2019s network interface card (NIC).\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>41. Which of the following is an example of circuit switching?<\/strong><br><\/mark>A) Internet browsing<br>B) Telephone network<br>C) Email<br>D) File download<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  Traditional telephone networks use circuit switching.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>42. Which of the following is an example of packet switching?<\/strong><br><\/mark>A) PSTN<br>B) Internet<br>C) Telegraph<br>D) Radio broadcasting<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  Internet communication uses packet switching.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>43. The smallest unit of data in a network is called:<\/strong><br><\/mark>A) Segment<br>B) Frame<br>C) Packet<br>D) Bit<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: D <\/b><BR>\n<b>Explanation:<\/b>  A bit (binary digit) is the smallest data unit in networking.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>44. In OSI model, segmentation and reassembly occur at which layer?<\/strong><br><\/mark>A) Data link<br>B) Network<br>C) Transport<br>D) Application<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b>  Transport layer breaks data into segments and reassembles them at destination.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>45. In computer networks, QoS stands for:<\/strong><br><\/mark>A) Quality of Software<br>B) Quality of Service<br>C) Query on System<br>D) Quick Operating System<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  QoS ensures performance guarantees like bandwidth, delay, and jitter.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>46. Which protocol is used to ping a host?<\/strong><br><\/mark>A) ICMP<br>B) TCP<br>C) UDP<br>D) ARP<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>   ICMP (Internet Control Message Protocol) is used for diagnostic functions like ping.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>47. Which protocol is used to resolve IP address to MAC address?<\/strong><br><\/mark>A) RARP<br>B) ARP<br>C) ICMP<br>D) DHCP<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  Address Resolution Protocol (ARP) maps IP addresses to MAC addresses.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>48. Which protocol maps MAC address to IP address?<\/strong><br><\/mark>A) RARP<br>B) ARP<br>C) ICMP<br>D) DNS<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  Reverse ARP (RARP) maps a device\u2019s MAC address to its IP address.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>49. Which of the following is NOT a function of transport layer?<\/strong><br><\/mark>A) Error detection<br>B) Flow control<br>C) Routing<br>D) Segmentation<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b>  Routing is handled by the network layer, not the transport layer.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>50. In TCP\/IP model, which layer corresponds to OSI application, presentation, and session layers combined?<\/strong><br><\/mark>A) Transport layer<br>B) Network layer<br>C) Application layer<br>D) Data link layer<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b>  TCP\/IP application layer combines OSI\u2019s top three layers.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>51. Which of the following is not a guided transmission medium?<br><\/strong><\/mark>A) Coaxial cable<br>B) Twisted pair cable<br>C) Fiber optic cable<br>D) Radio waves<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: D <\/b><BR>\n<b>Explanation:<\/b>  Radio waves are unguided transmission media, whereas coaxial, twisted pair, and fiber optics are guided.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">52. The main disadvantage of optical fiber is:<\/mark><\/strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><br><\/mark>A) High bandwidth<br>B) Lightweight<br>C) Fragile and costly<br>D) Immune to EMI<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b>  Fiber optics offer high speed and immunity to interference but are expensive and delicate.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">53. Which transmission medium is least affected by electromagnetic interference?<\/mark><\/strong><br>A) Twisted pair<br>B) Coaxial cable<br>C) Optical fiber<br>D) Microwave<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b>   Optical fibers use light instead of electricity, hence immune to EMI.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">54. Switching technique where the whole message is sent as a single unit is:<br><\/mark><\/strong>A) Circuit switching<br>B) Message switching<br>C) Packet switching<br>D) Time switching<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  In message switching, the entire message is stored and forwarded, unlike packet switching.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">55. In circuit switching, a path is established:<\/mark><\/strong><br>A) Only when needed<br>B) Permanently<br>C) For each packet separately<br>D) Without confirmation<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A <\/b><BR>\n<b>Explanation:<\/b>  Circuit switching establishes a dedicated path for the entire session, then releases it.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>56. The Internet uses which switching technique?<\/strong><\/mark><br>A) Circuit switching<br>B) Message switching<br>C) Packet switching<br>D) Frequency switching<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C  <\/b><BR>\n<b>Explanation:<\/b>  The Internet breaks data into packets which are routed independently.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">57. Which of the following is a disadvantage of circuit switching?<br><\/mark><\/strong>A) Guaranteed bandwidth<br>B) Inefficient resource utilization<br>C) Suitable for real-time voice<br>D) Connection-oriented<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  Once a circuit is established, resources remain reserved even if not fully used.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">58. Packet switching can be classified as:<\/mark><\/strong><br>A) Datagram and virtual circuit<br>B) Message and datagram<br>C) Circuit and virtual path<br>D) Bit and byte<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  Packet switching has two approaches: connectionless (datagram) and connection-oriented (virtual circuit).\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">59. In message switching, each message is stored at:<\/mark><\/strong><br>A) Sender side only<br>B) Receiver side only<br>C) Intermediate nodes<br>D) Router buffers only<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b>  Message switching uses the store-and-forward technique at each intermediate node.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">60. In OSI model, which layer handles routing and addressing?<\/mark><\/strong><br>A) Physical layer<br>B) Data link layer<br>C) Network layer<br>D) Transport layer<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b>  The network layer is responsible for logical addressing and path determination (routing).\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">61. TCP\/IP model combines OSI\u2019s session, presentation, and application layers into:<\/mark><\/strong><br>A) Session layer<br>B) Application layer<br>C) Transport layer<br>D) Network layer<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  The TCP\/IP model has fewer layers; the top three OSI layers merge into Application layer.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">62. Which protocol provides reliable, connection-oriented service?<br><\/mark><\/strong>A) UDP<br>B) TCP<br>C) IP<br>D) ICMP<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b> TCP ensures reliability using acknowledgments, sequencing, and retransmission.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">63. Which protocol is used for quick transmission without reliability?<br><\/mark><\/strong>A) TCP<br>B) UDP<br>C) IP<br>D) FTP<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  UDP is connectionless and fast, suitable for streaming and gaming where speed matters more.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">64. IP is responsible for:<\/mark><\/strong><br>A) Error detection<br>B) Reliable delivery<br>C) Logical addressing and routing<br>D) Encryption<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b>  IP provides logical addressing (IP addresses) and routing packets between networks.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">65. Which protocol is used for error reporting in IP?<\/mark><\/strong><br>A) ARP<br>B) ICMP<br>C) IGMP<br>D) DHCP<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>   ICMP (Internet Control Message Protocol) is used for error messages like &#8220;destination unreachable.&#8221;\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">66. Which protocol translates IP address to MAC address?<\/mark><\/strong><br>A) RARP<br>B) ARP<br>C) DHCP<br>D) ICMP<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  ARP (Address Resolution Protocol) maps logical (IP) address to physical (MAC) address.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">67. Which version of IP provides 128-bit addresses?<\/mark><\/strong><br>A) IPv4<br>B) IPv5<br>C) IPv6<br>D) ICMPv6<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b>  IPv6 uses 128-bit addressing, providing a huge address space compared to 32-bit IPv4.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">68. Which protocol assigns dynamic IP addresses?<\/mark><\/strong><br>A) DNS<br>B) ARP<br>C) DHCP<br>D) ICMP<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b>  DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses to devices.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">69. DNS works on which layer of OSI model?<\/mark><\/strong><br>A) Network layer<br>B) Transport layer<br>C) Application layer<br>D) Data link layer<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C  <\/b><BR>\n<b>Explanation:<\/b>  DNS is an application layer protocol that translates domain names to IP addresses.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">70. Which record type in DNS maps a domain name to an IP address?<br><\/mark><\/strong>A) MX record<br>B) A record<br>C) CNAME record<br>D) PTR record<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>   An &#8220;A&#8221; (Address) record maps a hostname to its IPv4 address.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">71. Which protocol is used to transfer files over the Internet?<br><\/mark><\/strong>A) SMTP<br>B) FTP<br>C) HTTP<br>D) SNMP<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  FTP (File Transfer Protocol) is used for file uploading and downloading.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">72. Which protocol is used for sending email?<\/mark><\/strong><br>A) FTP<br>B) SMTP<br>C) POP3<br>D) HTTP<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  SMTP (Simple Mail Transfer Protocol) is used to send emails from client to server.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">73. Which protocol is used for receiving email into a local client?<\/mark><\/strong><br>A) SMTP<br>B) POP3<br>C) FTP<br>D) DHCP<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>   POP3 (Post Office Protocol) allows downloading emails from the server to client.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">74. Which protocol is an alternative to POP3 and allows server-side email management?<br><\/mark><\/strong>A) IMAP<br>B) DHCP<br>C) SMTP<br>D) ICMP<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  IMAP (Internet Message Access Protocol) lets users read, organize, and manage emails without downloading them.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">75. Which protocol is used for browsing web pages?<\/mark><\/strong><br>A) FTP<br>B) HTTP<br>C) SMTP<br>D) DNS<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  HTTP is the protocol used by web browsers and web servers to communicate and transfer web pages over the Internet.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">76. Which protocol is used for secure communication over the web?<\/mark><br><\/strong>A) HTTP<br>B) HTTPS<br>C) FTP<br>D) SMTP<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  HTTPS (HTTP Secure) uses SSL\/TLS to encrypt web traffic for security.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">77. Which of the following is a network security device that monitors and controls traffic?<\/mark><br><\/strong>A) Hub<br>B) Switch<br>C) Firewall<br>D) Repeater<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b> A firewall filters and controls incoming and outgoing network traffic based on rules.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">78. Which type of attack floods a system with requests to exhaust resources?<\/mark><br><\/strong>A) Phishing<br>B) DoS<br>C) Spoofing<br>D) Sniffing<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  Denial of Service (DoS) attack makes a system unavailable by overwhelming it with traffic.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">79. A VPN provides security by using:<\/mark><br><\/strong>A) Encryption<br>B) Compression<br>C) Frequency hopping<br>D) Bandwidth allocation<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  Virtual Private Network (VPN) encrypts communication between remote users and networks.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">80. WPA2 is a security protocol used in:<\/mark><br><\/strong>A) Bluetooth<br>B) Wi-Fi<br>C) Ethernet<br>D) Satellite<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  WPA2 (Wi-Fi Protected Access 2) secures wireless networks with strong encryption.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">81. Which encryption method uses two different keys (public and private)?<br><\/mark><\/strong>A) Symmetric<br>B) Asymmetric<br>C) Hashing<br>D) Stream cipher<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  Asymmetric encryption uses a public-private key pair (e.g., RSA).\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">82. The process of converting plain text into coded text is called:<br><\/mark><\/strong>A) Decryption<br>B) Encryption<br>C) Encoding<br>D) Hashing<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  Encryption ensures confidentiality by converting plaintext into ciphertext.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">83. Which protocol is used for secure file transfer?<br><\/mark><\/strong>A) FTP<br>B) SFTP<br>C) HTTP<br>D) POP3<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  SFTP (Secure FTP) uses SSH for secure file transfer.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">84. SSL stands for:<\/mark><br><\/strong>A) Secure Socket Layer<br>B) System Security Layer<br>C) Software Socket Layer<br>D) Secure System Log<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  SSL is a protocol for securing communication between client and server, replaced by TLS.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">85. In wireless communication, which frequency band is commonly used by Wi-Fi?<\/mark><br><\/strong>A) 2.4 GHz and 5 GHz<br>B) 900 MHz<br>C) 7 GHz<br>D) 100 MHz<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: A  <\/b><BR>\n<b>Explanation:<\/b>  Wi-Fi networks typically operate in 2.4 GHz and 5 GHz ISM bands.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">86. Which wireless standard provides the fastest speed?<\/mark><br><\/strong>A) 802.11a<br>B) 802.11b<br>C) 802.11g<br>D) 802.11ac<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: D <\/b><BR>\n<b>Explanation:<\/b>  802.11ac supports gigabit speeds and is faster than previous Wi-Fi standards.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">87. Bluetooth technology is based on:<\/mark><br><\/strong>A) Infrared<br>B) Radio waves<br>C) Microwave<br>D) Optical fiber<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  Bluetooth operates in the 2.4 GHz radio frequency band.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">88. In mobile communication, 4G provides speeds up to:<\/mark><br><\/strong>A) 1 Mbps<br>B) 10 Mbps<br>C) 100 Mbps or more<br>D) 1 Gbps<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C  <\/b><BR>\n<b>Explanation:<\/b> 4G networks typically provide up to 100 Mbps for mobile and up to 1 Gbps for stationary users.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">89. 5G technology primarily focuses on:<\/mark><br><\/strong>A) Voice calls<br>B) High latency<br>C) Ultra-low latency and high speed<br>D) Only text messaging<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b>  5G supports massive IoT, ultra-low latency, and multi-gigabit speeds.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">90. Which satellite communication orbit is closest to Earth?<\/mark><br><\/strong>A) GEO<br>B) MEO<br>C) LEO<br>D) HEO<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b>  Low Earth Orbit (LEO) satellites are closest, typically 500\u20132000 km above Earth.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">91. Which switching technique is mostly used in telephone networks?<\/mark><br><\/strong>A) Packet switching<br>B) Circuit switching<br>C) Message switching<br>D) Frequency switching<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  Traditional telephone systems use circuit switching for dedicated communication.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">92. Which device is used to regenerate signals in networking?<\/mark><br><\/strong>A) Switch<br>B) Router<br>C) Repeater<br>D) Hub<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b>   Repeaters regenerate and amplify weak signals to extend the transmission distance.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">93. Which device works at the data link layer?<\/mark><br><\/strong>A) Router<br>B) Switch<br>C) Repeater<br>D) Modem<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  Switches operate at Layer 2 of the OSI model and forward frames based on MAC addresses.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">94. Which device connects two different networks?<\/mark><br><\/strong>A) Switch<br>B) Router<br>C) Hub<br>D) Repeater<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  A router connects multiple networks and forwards packets based on IP addresses.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">95. Which protocol is used for remote login?<\/mark><br><\/strong>A) FTP<br>B) SSH<br>C) SMTP<br>D) HTTP<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  SSH (Secure Shell) allows secure remote login and command execution.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">96. Cloud computing primarily depends on:<br><\/mark><\/strong>A) Local servers<br>B) Centralized power supply<br>C) Virtualization and networking<br>D) Optical disks<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C  <\/b><BR>\n<b>Explanation:<\/b>  Cloud computing relies on virtualization for resource sharing and networking for connectivity.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">97. Which is not a cloud service model?<\/mark><br><\/strong>A) IaaS<br>B) PaaS<br>C) SaaS<br>D) BIOS<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: D  <\/b><BR>\n<b>Explanation:<\/b>  IaaS, PaaS, and SaaS are cloud models; BIOS is related to computer hardware.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">98. IoT (Internet of Things) devices are typically connected using:<br><\/mark><\/strong>A) Satellite only<br>B) Wired Ethernet only<br>C) Wireless technologies like Wi-Fi, Zigbee<br>D) Magnetic waves<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: C <\/b><BR>\n<b>Explanation:<\/b>  IoT devices often use Wi-Fi, Zigbee, LoRa, or Bluetooth for connectivity.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">99. In networking, latency refers to:<br><\/mark><\/strong>A) Bandwidth<br>B) Delay in data transmission<br>C) Error rate<br>D) Packet loss<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  Latency is the time taken for data to travel from source to destination.\n <\/p>\n<\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">100. Which organization standardizes Internet protocols?<br><\/mark><\/strong>A) IEEE<br>B) IETF<br>C) ISO<br>D) ITU<\/p>\n\n\n\n<button class=\"acc\">Show Answer<\/button>\n<div class=\"pnl\">\n  <p style=\"font-size: 22px;\"><b> Answer: B <\/b><BR>\n<b>Explanation:<\/b>  The Internet Engineering Task Force (IETF) develops and standardizes Internet protocols.\n <\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>1. Data communication refers to:A) Process of storing dataB) Process of transmitting data between devicesC) Process of securing dataD) Process of analyzing data Show Answer Answer: B Explanation: Data communication involves transferring digital or analog data between devices via transmission media. 2. Which of the following is not a component of data communication?A) MessageB) SenderC)<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"[]"},"categories":[1],"tags":[],"class_list":{"0":"post-17920","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-blog"},"_links":{"self":[{"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/posts\/17920","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/comments?post=17920"}],"version-history":[{"count":100,"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/posts\/17920\/revisions"}],"predecessor-version":[{"id":30617,"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/posts\/17920\/revisions\/30617"}],"wp:attachment":[{"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/media?parent=17920"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/categories?post=17920"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/tags?post=17920"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}