| Computer Networks Question Answers Basics/ |
A. Local area network
B. Virtual private network
C. Enterprise private network
D. Storage area network
Explanation: A virtual private network extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.VPN provides enhanced security and online anonymity to users on the internet. It is also used to unblock websites which are unavailable in certain regions.
A. Prior network
B. Chief network
C. Prime network
D. Overlay network
Explanation: An overlay network is a computer network that is built on top of another network. Some examples of an overlay network are Virtual Private Networks (VPN) and Peer-to-Peer Networks (P2P).
A. A process in one device is able to exchange information with a process in another device
B. A process is running on both devices
C. Pids of the processes running of different devices are same
D. A process is active and another is inactive
Explanation: A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections between nodes. The nodes have certain processes which enable them to share a specific type of data using a distinct protocol.
A. The computer that originates the data
B. The computer that routes the data
C. The computer that terminates the data
D. All of the mentioned
Explanation: In a computer network, a node can be anything that is capable of sending data or receiving data or even routing the data to its destination. Routers, Computers and Smartphones are some examples of network nodes.
A. Broadcast network
B. Unicast network
C. Multicast network
D. Anycast network
Explanation: In a broadcast network, information is sent to all stations in a network whereas in a multicast network the data or information is sent to a group of stations in the network. In unicast network, information is sent to only one specific station. The broadcast address of the network is the last assigned address of the network.
A. Personal area network
B. Local area network
C. Virtual private network
D. Wide area network
Explanation: Bluetooth is a wireless technology used to create a wireless personal area network for data transfer up to a distance of 10 meters. It operates on 2.45 GHz frequency band for transmission.
A. Bridge
B. Firewall
C. Router
D. Hub
Explanation: A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. They make use of routing protocols like RIP to find the cheapest path to the destination.
A. Protocol architecture
B. Protocol stack
C. Protocol suite
D. Protocol system
Explanation: A protocol stack refers to a group of protocols that are running concurrently that are employed for the implementation of network protocol suite. Each layer in the network model has to use one specific protocol from the protocol stack.
A. In case of traffic overloading
B. When a system terminates
C. When connection between two nodes terminates
D. In case of transfer failure
Explanation: Network congestion occurs when traffic in the network is more than the network could handle. To avoid network congestion, the network management uses various open-loop and closed-loop congestion control techniques.