Home / CSE MCQs / Computer Network MCQs :: Data Link Layer - Computer Networks

CSE MCQs :: Computer Network MCQs

  1. The data link layer takes the packets from _____ and encapsulates them into frames for transmission.
  2. A.
    network layer
    B.
    physical layer
    C.
    transport layer
    D.
    application layer

  3. Which one of the following task is not done by data link layer?
  4. A.
    framing
    B.
    error control
    C.
    flow control
    D.
    channel coding

  5. Which sublayer of the data link layer performs data link functions that depend upon the type of medium?
  6. A.
    logical link control sublayer
    B.
    media access control sublayer
    C.
    network interface control sublayer
    D.
    none of the mentioned

  7. Header of a frame generally contains:
  8. A.
    synchronization bytes
    B.
    addresses
    C.
    frame identifier
    D.
    all of the mentioned

  9. Automatic repeat request error management mechanism is provided by:
  10. A.
    logical link control sublayer
    B.
    media access control sublayer
    C.
    network interface control sublayer
    D.
    none of the mentioned

  11. When 2 or more bits in a data unit has been changed during the transmission, the error is called:
  12. A.
    random error
    B.
    burst error
    C.
    inverted error
    D.
    none of the mentioned

  13. CRC stands for:
  14. A.
    cyclic redundancy check
    B.
    code repeat check
    C.
    code redundancy check
    D.
    cyclic repeat check

  15. Which one of the following is a data link protocol?
  16. A.
    ethernet
    B.
    point to point protocol
    C.
    HDLC
    D.
    all of the mentioned

  17. Which one of the following is the multiple access protocol for channel access control?
  18. A.
    CSMA/CD
    B.
    CSMA/CA
    C.
    both (a) and (b)
    D.
    none of the mentioned

  19. The technique of temporarily delaying outgoing outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called:
  20. A.
    piggybacking
    B.
    cyclic redundancy check
    C.
    fletcher's checksum
    D.
    none of the mentioned