20 Questions on Computer Network For Lok Sewa Ayog Exam
PSC (Public Service Commission)/Lok Sewa Aayog was established in Nepal on 15 June 1951 A.D. The Commission is involved in selecting meritorious candidates required by Government of Nepal for various vacant posts of the civil service. The continuity of PSC has never been hindered since its establishment.
Here, we have picked 20 Multiple Choice Questions with answers on Computer Networking for Public Service Commission/Lok Sewa Exam. Hope, these questions/answers will definitely help you in succeeding PSC exams and empower your General Knowledge.
20 Multiple Choice Questions on Computer Network For Lok Sewa Ayog Exam
Question Collection for Lok Sewa Ayog
1. Local area network can transmit
(a) faster than telecommunications over public telephone lines (b) slower than telecommunications over public telephone lines (c) using twisted pair wiring on coaxial cables (d) both a and c
Ans: (d) both a and c
2. In OSI network architecture, the dialogue control and token management are responsibilities of
(a)Session Layer (b) network layer (c) transport layer (d) data link layer
Ans: (a)Session Layer
3. Which one of the following is NOT true for a computer virus?
(a) computer virus can be contracted via internet (b) computer virus is a software (c) another standalone computer in the vicinity of the virus affected computer may be contracted with virus (d) pen drives can contract with virus
Ans: (c) another standalone computer in the vicinity of the virus affected computer may be contracted with virus
4. Four bits are used for packed sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size?
(a) 4 (b) 8 (c) 15 (d) 16
Ans: (c) 15
5. What is the default port number for FTP?
(a) 21 (b) 18 (c) 25 (d)20
Ans: (a) 21
6. ARP (Address Resolution Protocol) is
(a) a TCP/IP protocol used to dynamically bind a high level IP address to a low- level physical hardware address
(b) a TCP/IP high level protocol for transferring files from one machine to another
(c) a protocol used to monitor computers
(d) a protocol that handles error and control messages
Ans: (d) a protocol that handles error and control messages
7. The X.25 standards specifies a
(a)technique for start-stop data (b) technique for dial access (c) DTE/DCE interface (d) data bit rate
Ans: (c) DTE/DCE interface
8. Which protocol is used for sending email on the internet?
(a) SMTP (b) SMPP (c) SNMP (d) FTP
Ans: (a) SMTP
9. A basic telephone system is an example of
(a) packet switching (b) cell switching (c) circuit switching (d) message switching
Ans: (c) circuit switching
10. 127.0.0.1 is a
(a) limited broadcast address (b) direct broadcast address
(c) multicast address (d) loop-back address
Ans: (d) loop-back address
11. How many hosts can successfully send data simultaneously on Ethernet?
(a) 1 (b) 2 (c)3 (d) unlimited
Ans: (b) 2
12. Which one of the following uses the greatest number of layers in the OSI model?
(a) Bridge (b) Repeater (c) Router (d) Gateway
Ans: (d) Gateway
13. Which of the following TCP/IP protocol is used for remote terminal connection services?
(a) TELNET (b) FTP
(c) RARP (d) UDP
Ans: (a) TELNET
14. Which of the fol lowing 802 standard provides for a collision free protocol?
(a) 802.2 (b) 802.3 (c) 802.5 (d) 802.6
Ans: (c) 802.5
15. In OSI network architecture, the routing is performed by
(a)Session Layer (b) network layer (c) transport layer (d) data link layer
Ans: (b) network layer
16. In asymmetric key cryptography, _______ keys are required per communicating party
(a) 2 (b)3 (c)4 (d) 5
Ans: (a) 2
17. Simple network management protocol (SNMP) is implemented with a daughter-board in
(a)the nodes (b) the server (c) the hub (d) a separate PC that manages the network server
Ans: (c) the hub
18. A digital signature is
(a) a bit string giving identity of a correspondent (b) a unique identification of a sender (c) an authentication of an electronic record by tying it uniquely to a key only a sender can posses (d)an encrypted signature of sender
Ans: (c) an authentication of an electronic record by tying it uniquely to a key only a sender can posses
19. Which one of the following is used to communicate between different networks
(a) ADSL (b) HDSL (c) Gateway (d) Modem
Ans: (c) Gateway
20. The access method used in Ethernet LAN is
(a) CSMA/CA (b) CSMA/CD (c) CLIP (d) CMA/CD
Ans: (b) CSMA/CD