Chapter 10: Data Communication and Internet Services (Set-6)
In a standard communication setup, the device that receives the data is called the
A Sender node
B Medium path
C Protocol rule
D Receiver node
The receiver is the destination device that accepts the transmitted message. It decodes the signal and presents the data in a useful form, following the same communication rules as the sender.
In data communication, the “medium” refers to
A Message content
B Sender device
C Transmission path
D Receiver device
The medium is the channel that carries signals from sender to receiver, such as copper wire, fiber optic cable, or wireless radio. The medium affects speed, noise, and distance.
Which mode fits a keyboard sending input to a computer in one direction only
A Simplex mode
B Half-duplex mode
C Full-duplex mode
D Session mode
Simplex communication is one-way only. A keyboard sends data to the computer, but the computer does not send data back through the keyboard channel in normal operation.
A telephone call is an example of
A Simplex mode
B Full-duplex mode
C One-way mode
D Broadcast mode
In full-duplex, both sides can speak and listen simultaneously. Telephone calls support two-way communication at the same time, making conversation natural without waiting turns.
A walkie-talkie system is a classic example of
A Full-duplex mode
B Simplex mode
C Half-duplex mode
D Packet mode
Walkie-talkies allow both people to talk, but only one at a time. This “push-to-talk” method is half-duplex, where direction changes but simultaneous transmission is not possible.
The term “bandwidth” mainly means
A Maximum channel capacity
B File storage size
C Packet header size
D Number of routers
Bandwidth is the capacity of a communication channel to carry data. Higher bandwidth links can support more data per second, though real speed also depends on noise and congestion.
Network speed is usually expressed in
A Pages per minute
B Volts per meter
C Inches per second
D Bits per second
Transmission speed is measured in bps, such as Mbps or Gbps. It shows how many bits can be transmitted per second, helping compare connection performance and capacity.
Noise in data communication refers to
A Higher bandwidth
B Faster routing
C Unwanted interference
D Data compression
Noise is unwanted disturbance that affects signal quality. It can change bit values, create errors, reduce throughput, and force retransmissions, especially on long or poorly shielded links.
Attenuation means
A Signal strength loss
B Signal encryption
C Address mapping
D Packet routing
Attenuation is the weakening of signal power over distance. As signals travel through a medium, they lose energy, so boosters or better media may be needed to maintain clarity.
Modulation is used to
A Store cookies
B Assign IP address
C Carry data on wave
D Create DNS records
Modulation changes a carrier signal to represent data, such as varying frequency or phase. It is essential in wireless communication and many broadband systems for efficient transmission.
The OSI model consists of
A Four layers
B Seven layers
C Three layers
D Two layers
The OSI model divides networking into seven layers to explain how data moves from applications down to physical transmission and back, helping standardize networking concepts and troubleshooting.
The OSI layer responsible for routing is
A Physical layer
B Session layer
C Presentation layer
D Network layer
The Network layer handles logical addressing and routing decisions. It selects paths and forwards packets through routers so data can reach devices across different networks.
The OSI layer that uses frames and MAC addresses is
A Transport layer
B Application layer
C Data Link layer
D Session layer
The Data Link layer manages communication on the same local network using frames. It uses MAC addresses for local delivery and includes error detection to reduce corrupted transmissions.
Which OSI layer provides end-to-end delivery services like reliability and sequencing
A Transport layer
B Network layer
C Physical layer
D Data Link layer
The Transport layer provides end-to-end communication between applications. Protocols like TCP offer reliable delivery with sequencing and acknowledgments, while UDP provides faster but less reliable delivery.
The TCP/IP model is commonly described as
A Seven layers
B Two layers
C Four layers
D Ten layers
TCP/IP is often shown as four layers: Link, Internet, Transport, and Application. This model matches real internet protocols and how data is packaged and transmitted.
IP is mainly responsible for
A Email reading
B Logical addressing
C Web page styling
D File compression
IP provides logical addressing and routing so packets can travel across multiple networks. It forwards packets toward the destination IP, while reliability is handled by higher protocols like TCP.
TCP is best known for providing
A Name resolution
B IP assignment
C Wireless modulation
D Reliable delivery
TCP ensures data reaches correctly using acknowledgments, sequencing, and retransmissions. It is used for web browsing, file downloads, and email where correctness and order matter.
UDP is best known for being
A Encrypted protocol
B Routing algorithm
C Connectionless transport
D File transfer tool
UDP sends data without establishing a connection and has low overhead. It is useful for streaming and voice where speed matters, while the application can handle occasional loss.
HTTP is primarily used for
A Web page transfer
B Email sending
C IP address leasing
D Domain name storage
HTTP allows browsers to request resources and servers to respond with web pages, images, and data. It follows a request/response pattern and is the foundation of web communication.
HTTPS provides HTTP with
A DHCP service
B DNS caching
C TLS security
D FTP control
HTTPS adds TLS encryption and integrity to HTTP. It protects data from eavesdropping and tampering and uses certificates to help verify the website’s identity.
TLS is used to provide
A IP routing tables
B Encryption and integrity
C DHCP leasing
D MAC addressing
TLS encrypts data and adds integrity checks so traffic cannot be easily read or modified in transit. It also supports identity verification using certificates during secure connections like HTTPS.
A URL is best described as
A Router hardware ID
B Email user name
C Web resource address
D DNS zone file
A URL is the address used to locate a resource on the web. It typically includes the protocol (http/https), domain name, and a path to a specific page or file.
The HTTP method used to fetch a resource is usually
A GET method
B POST method
C DELETE method
D PUT method
GET requests retrieve data like pages or images. It is generally used for read-only operations, and caching can apply, helping speed up repeated access to the same resource.
The HTTP method commonly used to submit form data is
A GET method
B TRACE method
C HEAD method
D POST method
POST sends data in the request body, making it suitable for form submissions and updates. It can carry more data than GET and is often used for creating or modifying server-side data.
HTTP status code 404 means
A Success
B Redirected
C Not found
D Unauthorized
A 404 response means the server cannot find the requested resource at that URL. The server is reachable, but the page or file does not exist at the specified path.
HTTP status code 200 means
A OK success
B Not found
C Server error
D Forbidden
HTTP 200 indicates the request was successful and the server returned the requested content. Browsers use it to display pages when the resource is available normally.
A web cookie mainly stores
A IP routing rules
B Cable noise level
C Small browser data
D FTP port mapping
Cookies store small pieces of information in the browser, such as session IDs or preferences. They help websites remember user state across requests, including logins and settings.
DNS stands for and mainly provides
A File transfer service
B Name to IP
C Email encryption
D Dynamic bandwidth
DNS maps domain names to IP addresses so computers can locate servers. Without DNS, users would need to remember numeric IP addresses to access websites and online services.
DHCP is mainly used for
A Web page hosting
B Email synchronization
C File upload service
D Automatic IP assignment
DHCP automatically assigns IP address, subnet mask, gateway, and DNS settings. This reduces manual configuration and prevents conflicts when many devices join the same network.
A DHCP lease refers to
A Temporary IP assignment
B Permanent domain mapping
C Fixed MAC address
D Encrypted tunnel key
A lease is the time-limited permission for a device to use an assigned IP address. The device must renew before expiry, helping the network reuse addresses efficiently.
The default gateway is typically the
A DNS server address
B Email server name
C Router IP address
D MAC address list
The default gateway forwards traffic to other networks. When a destination is outside the local subnet, the device sends packets to the router gateway for internet or external access.
A subnet mask helps identify
A Network and host parts
B Email account settings
C Browser cookie data
D File upload size
Subnet masks separate the network portion and host portion of an IP address. This helps devices decide whether a destination is local or must be sent to the default gateway.
FTP is mainly used for
A Web encryption
B Name resolution
C File transfer
D IP assignment
FTP transfers files between a client and server, supporting upload and download. It is used for website file management and file sharing, though secure alternatives are often preferred.
The default FTP control port is
A Port 80
B Port 443
C Port 25
D Port 21
FTP typically uses port 21 for the control connection where commands and responses are exchanged. Data transfer uses separate connections depending on active or passive mode.
Port 80 is commonly used by
A HTTP service
B HTTPS service
C FTP service
D DNS service
Port 80 is the standard port for HTTP web traffic. Secure web browsing uses port 443 for HTTPS, while email and DNS services use different well-known ports.
Port 443 is commonly used by
A HTTP service
B POP3 service
C HTTPS service
D SMTP service
Port 443 is used for HTTPS, which secures web traffic using TLS. Browsers connect to it for encrypted sessions, especially on login and payment pages.
SMTP is used for
A Receiving email
B Sending email
C Web browsing
D IP leasing
SMTP transfers outgoing email from clients to servers and between mail servers. Receiving mail is typically handled by POP3 or IMAP, not by SMTP.
POP3 is used mainly to
A Send emails
B Encrypt traffic
C Assign IPs
D Download emails
POP3 allows an email client to retrieve messages from a mail server, often storing them locally. It is simple and widely supported, but less ideal for multi-device synchronization.
IMAP is used mainly to
A Assign gateway
B Transfer files
C Sync mailbox
D Resolve names
IMAP keeps email on the server and synchronizes it across devices. It supports folders and read/unread states, making it suitable when users access email from multiple devices.
Ping is used to
A Test reachability
B Send email
C Upload file
D Assign IP
Ping checks if a host responds and measures round-trip time using ICMP. It helps troubleshoot connectivity and basic network responsiveness between your device and a server.
Traceroute is used to
A Create cookies
B Show path hops
C Encrypt data
D Assign DNS
Traceroute lists routers along the path to a destination. It helps identify where delays or failures happen by showing each hop and response times on the route.
A proxy server can
A Create MAC address
B Change subnet mask
C Forward and filter
D Increase attenuation
A proxy acts as an intermediary between users and the internet. It can filter access, log usage, cache content for speed, and sometimes provide privacy by hiding client details.
A VPN mainly creates
A Encrypted tunnel
B DNS record list
C DHCP address pool
D FTP user account
A VPN encrypts traffic between your device and a VPN server, protecting data on public networks. It can also provide secure remote access to private networks and services.
NAT allows multiple devices to
A Increase signal strength
B Remove TCP headers
C Share one public IP
D Disable routing
NAT translates private internal addresses to a public address for internet access. This allows many devices to share a single public IPv4 address and reduces the need for many public IPs.
A MAC address is
A Website domain name
B Internet speed unit
C DNS cache entry
D Hardware interface ID
A MAC address uniquely identifies a network interface at the Data Link layer. It is used for local LAN communication, while IP addresses are used for routing across networks.
An ISP provides
A DHCP encryption
B Internet access
C TCP sequencing
D DNS spoofing
An Internet Service Provider connects users to the internet using fiber, cable, DSL, or mobile networks. ISPs often also provide services like DNS, modems, and customer support.
Web hosting provides
A Server space online
B Dynamic IP only
C MAC address tools
D Noise reduction devices
Web hosting stores website files on internet-connected servers. It provides storage, bandwidth, and server software so websites can be accessed publicly with reliable uptime and performance.
VoIP refers to
A Video over IP only
B File transfer mode
C Voice over internet
D DNS security method
VoIP carries voice calls using IP networks as data packets. It can reduce costs and enable features, but it requires stable connectivity with low delay, low jitter, and minimal packet loss.
Data packets are used because they
A Remove all noise
B Replace protocols
C Stop attenuation
D Improve efficient transfer
Packets allow large data to be split and routed efficiently across networks. Each packet can take the best path, and the receiver reassembles them, improving sharing and reliability in networks.
Encapsulation means
A Deleting data fields
B Wrapping data with headers
C Blocking IP packets
D Reducing bandwidth
Encapsulation adds headers at each networking layer, such as TCP and IP headers. These headers carry addressing and control information, allowing data to be delivered and interpreted correctly.