CUET-UG SERIES
Computer-science

Computer Networks

19 previous year questions.

Volume: 19 Ques
Yield: Medium

High-Yield Trend

8
2025
8
2024
3
2023

Chapter Questions
19 MCQs

01
PYQ 2023
medium
computer-science ID: cuet-ug-
Which of the following address is associated with a network adapter (NIC) ?
1
IP address
2
Port address
3
MAC address
4
URL
02
PYQ 2023
medium
computer-science ID: cuet-ug-
Match List I with List II
List IList II
A.MAC addressI.32 bits
B.RJ-45II.NIC card
C.IP addressIII.48 bits
D.Ethernet cardIV.Ethernet cables
Choose the correct answer from the options given below :
1
A-III, B-I, C-II, D-IV
2
A-III, B-II, C-I, D-IV
3
A-I, B-II, C-IV, D-III
4
A-III, B-IV, C-I, D-II
03
PYQ 2023
medium
computer-science ID: cuet-ug-
The ____ is the largest WAN that connects billions of computers, smartphones and millions of LAN from different Continents.
1
Internet
2
Intranet
3
Subnet
4
Supernet
04
PYQ 2024
medium
computer-science ID: cuet-ug-
A long cable that helps to connect several devices in a bus topology and has terminators at both ends to prevent signal bounce is known as ________
1
Drop Line
2
Taps
3
Analog Cable
4
Backbone
05
PYQ 2024
medium
computer-science ID: cuet-ug-
Which device provides the necessary translation of data received from the network into a format recognized within the internal network?
1
Bridge
2
Gateway
3
Router
4
Modem
06
PYQ 2024
medium
computer-science ID: cuet-ug-

Which of the following statement(s) is/are TRUE regarding computer network?
(A) Interspace is a software that allows multiple users in a client-server environment to communicate with each other by sending and receiving data of various types.
(B) IP address is a unique permanent value associated with a network adapter called a NIC.
(C) A computer network is an interconnection among two or more computers or computing devices to share data and resources.
(D) The term ’Workstation’ refers to the most powerful computer of the network that facilitates sharing of data, software, and hardware resources on the network and has more memory, processing power, and storage than a normal node.
Choose the correct answer from the options given below:

1
(C) and (D) only
2
(A), (B), and (C) only
3
(A) and (C) only
4
(B) and (D) only
07
PYQ 2024
medium
computer-science ID: cuet-ug-
In a ________ topology, if there are n devices in a network, each device has n-1 ports for cables.
1
Mesh
2
Bus
3
Star
4
Ring
08
PYQ 2024
medium
computer-science ID: cuet-ug-
140.168.220.200 is a 32-bit binary number represented as four decimal values, each 8 bits, in the range 0 to 255 separated by decimal points. What is this number called?
1
IP Address
2
Web Address
3
MAC Address
4
Port Address
09
PYQ 2024
medium
computer-science ID: cuet-ug-
What is the purpose of a Domain Name System (DNS) Server in networking?
1
To encrypt data during transmission
2
To convert domain names into IP addresses
3
To regulate network traffic flow
4
To establish a secure connection between devices
10
PYQ 2024
medium
computer-science ID: cuet-ug-
Match List-I with List-II:
List-I (Device)List-II (Use)
(A) RJ45 Connector(I) relay frames between two originally separate segments that follow same protocols.
(B) Bridge(II) amplifies a signal that is transmitted across the network so that the signal is received same as it is sent.
(C) Gateway(III) establishes an intelligent connection between a local area network and external networks with completely different structures.
(D) Repeater(IV) plug-in device primarily used for connecting LANs particularly Ethernet.
1
(A) - (IV), (B) - (III), (C) - (II), (D) - (I)
2
(A) - (III), (B) - (II), (C) - (I), (D) - (IV)
3
(A) - (III), (B) - (I), (C) - (IV), (D) - (II)
4
(A) - (IV), (B) - (I), (C) - (III), (D) - (II)
11
PYQ 2024
medium
computer-science ID: cuet-ug-
Which of the following statement(s) is/are TRUE in respect of Media Access Control (MAC) Address?
Options:
(A) It can be changed if a node is removed from one network and connected to another network.
(B) Each MAC address is a 12-digit hexadecimal number.
(C) It is a unique value associated with a network adapter called NIC.
(D) It is provided by the Internet Service Provider to locate computers connected to the internet.
Choose the correct answer from the options given below:
1
(B) and (C) only
2
(A), (B), and (C) only
3
(C) and (D) only
4
(A) and (B) only
12
PYQ 2025
medium
computer-science ID: cuet-ug-
Identify the correct IP address from the options given:
1
FC:F8:AE:CE:7B:16
2
192.168.256.178
3
192.168.0.178
4
192.168.0.-1
13
PYQ 2025
medium
computer-science ID: cuet-ug-
In MAC address, Organisational Unique Identifier (OUI) consists of __________.
1
32 bits
2
48 bits
3
24 bits
4
64 bits
14
PYQ 2025
medium
computer-science ID: cuet-ug-
Match List-I with List-II. \
List-IList-II
(A) Modem(II) Modulator-Demodulator
(B) RJ45(I) An eight pin connector used with Ethernet cables for networking.
(C) Network interface unit(IV) Ethernet card
(D) ISP(III) An organization that provides services for accessing the internet.
1
(A)-(I), (B)-(II), (C)-(III), (D)-(IV)
2
(A)-(II), (B)-(I), (C)-(IV), (D)-(III)
3
(A)-(I), (B)-(II), (C)-(IV), (D)-(III)
4
(A)-(II), (B)-(IV), (C)-(I), (D)-(III)
15
PYQ 2025
medium
computer-science ID: cuet-ug-
Identify the correct place where we have to use repeaters.
1
Between A to B
2
Between A to C
3
Between A to D
4
Between A to E
16
PYQ 2025
medium
computer-science ID: cuet-ug-
Bandwidth of a channel is:
1
The range of frequencies available for transmission of data through that channel.
2
The path of message travels between source and destination.
3
The set of rules on the Internet.
4
The data or information that needs to be exchanged.
17
PYQ 2025
medium
computer-science ID: cuet-ug-
Match List-I with List-II.
List-IList-II
(A) ROUTER(II) Network Device
(B) ETHERNET CARD(IV) Network Interface Card
(C) RING(I) Network Topology
(D) PAN(III) Network Type
1
(A)-(II), (B)-(IV), (C)-(I), (D)-(III)
2
(A)-(I), (B)-(III), (C)-(II), (D)-(IV)
3
(A)-(IV), (B)-(I), (C)-(II), (D)-(III)
4
(A)-(III), (B)-(IV), (C)-(I), (D)-(II)
18
PYQ 2025
medium
computer-science ID: cuet-ug-
What is the purpose of a firewall in network security?
1
To encrypt data transmissions
2
To monitor and control incoming and outgoing network traffic
3
To store user authentication data
4
To compress network packets
19
PYQ 2025
medium
computer-science ID: cuet-ug-
Which protocol is used for secure communication over the internet?
1
HTTP
2
FTP
3
HTTPS
4
SMTP