MCQOPTIONS
Saved Bookmarks
This section includes 304 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 101. |
URL stands for |
| A. | unique reference label |
| B. | uniform reference label |
| C. | uniform resource locator |
| D. | unique resource locator |
| Answer» D. unique resource locator | |
| 102. |
Dynamic web page |
| A. | is same every time whenever it displays |
| B. | generates on demand by a program or a request from browser |
| C. | both is same every time whenever it displays and generates on demand by a program or a request from browser |
| D. | is different always in a predefined order |
| Answer» C. both is same every time whenever it displays and generates on demand by a program or a request from browser | |
| 103. |
RMI uses stub and skeleton for communication with the                  object. |
| A. | client |
| B. | remote |
| C. | server |
| D. | any |
| Answer» C. server | |
| 104. |
A gateway for the server side object. |
| A. | skeleton |
| B. | stub |
| C. | remote |
| D. | server |
| Answer» B. stub | |
| 105. |
An object acting as a gateway for the client side. |
| A. | skeleton |
| B. | stub |
| C. | remote |
| D. | server |
| Answer» C. remote | |
| 106. |
A middleware layer between the stub skeleton and transport. |
| A. | remote layer |
| B. | instruction layer |
| C. | reference layer |
| D. | remote reference layer |
| Answer» E. | |
| 107. |
The                        layer, which provides the interface that client and server application objects use to interact with each other. |
| A. | increasing |
| B. | count |
| C. | bit |
| D. | stub/skeleton |
| Answer» E. | |
| 108. |
A layer which is the binary data protocol layer. |
| A. | stub layer |
| B. | skeleton layer |
| C. | remote layer |
| D. | transport protocol |
| Answer» E. | |
| 109. |
A typical                      program obtains a remote reference to one or more remote objects on a server and then invokes methods on them. |
| A. | server |
| B. | client |
| C. | thread |
| D. | concurrent |
| Answer» C. thread | |
| 110. |
A typical                    program creates some remote objects, makes references to these objects accessible, and waits for clients to invoke methods on these objects. |
| A. | server |
| B. | client |
| C. | thread |
| D. | concurrent |
| Answer» B. client | |
| 111. |
A remote object is an object whose method can be invoked from another virtual environment. |
| A. | true |
| B. | false |
| C. | topic 5.2 client server programming |
| Answer» B. false | |
| 112. |
RMI stands for? |
| A. | remote mail invocation |
| B. | remote message invocation |
| C. | remaining method invocation |
| D. | remote method invocation |
| Answer» E. | |
| 113. |
E-mail is |
| A. | loss-tolerant application |
| B. | bandwidth-sensitive application |
| C. | elastic application |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 114. |
Application layer offers                service. |
| A. | end to end |
| B. | process to process |
| C. | both end to end and process to process |
| D. | none of the mentioned |
| Answer» B. process to process | |
| 115. |
In the slow-start algorithm, the size of the congestion window increases                      until it reaches a threshold. |
| A. | exponentially |
| B. | additively |
| C. | multiplicatively |
| D. | suddenly |
| Answer» B. additively | |
| 116. |
The technique in which a congested node stops receiving data from the immediate upstream node or nodes is called as |
| A. | admission policy |
| B. | backpressure |
| C. | forward signaling |
| D. | backward signaling |
| Answer» C. forward signaling | |
| 117. |
In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. Whereas in Selective Repeat window, the sender resends |
| A. | packet which are not lost |
| B. | only those packets which are lost or corrupted |
| C. | packet from starting |
| D. | all the packets |
| Answer» C. packet from starting | |
| 118. |
Retransmission of packets must not be done when |
| A. | packet is lost |
| B. | packet is corrupted |
| C. | packet is needed |
| D. | packet is error-free |
| Answer» E. | |
| 119. |
Two broad categories of congestion control are |
| A. | open-loop and closed-loop |
| B. | open-control and closed-control |
| C. | active control and passive control |
| D. | active loop and passive loop |
| Answer» B. open-control and closed-control | |
| 120. |
Closed-Loop control mechanisms try to |
| A. | remove after congestion occurs |
| B. | remove after sometime |
| C. | prevent before congestion occurs |
| D. | prevent before sending packets |
| Answer» B. remove after sometime | |
| 121. |
Bytes of data being transferred in each connection are numbered by TCP. These numbers start with a |
| A. | fixed number |
| B. | random sequence of 0’s and 1’s |
| C. | one |
| D. | sequence of zero’s and one’s |
| Answer» E. | |
| 122. |
Communication offered by TCP is |
| A. | full-duplex |
| B. | half-duplex |
| C. | semi-duplex |
| D. | byte by byte |
| Answer» B. half-duplex | |
| 123. |
The value of acknowledgement field in a segment defines |
| A. | sequence number of the byte received previously |
| B. | total number of bytes to receive |
| C. | sequence number of the next byte to be received |
| D. | sequence of zeros and ones |
| Answer» D. sequence of zeros and ones | |
| 124. |
Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment? |
| A. | 10000 |
| B. | 10001 |
| C. | 12001 |
| D. | 11001 |
| Answer» C. 12001 | |
| 125. |
In TCP, sending and receiving data is done as |
| A. | stream of bytes |
| B. | sequence of characters |
| C. | lines of data |
| D. | packets |
| Answer» B. sequence of characters | |
| 126. |
The              field is used to detect errors over the entire user datagram. |
| A. | udp header |
| B. | checksum |
| C. | source port |
| D. | destination port |
| Answer» C. source port | |
| 127. |
TCP groups a number of bytes together into a packet called |
| A. | packet |
| B. | buffer |
| C. | segment |
| D. | stack |
| Answer» D. stack | |
| 128. |
“Total length†field in UDP packet header is the length of |
| A. | only udp header |
| B. | only data |
| C. | only checksum |
| D. | udp header plus data |
| Answer» E. | |
| 129. |
The port number is “ephemeral port numberâ€, if the source host is |
| A. | ntp |
| B. | echo |
| C. | server |
| D. | client |
| Answer» E. | |
| 130. |
Return value of the UDP port “Chargen†is |
| A. | string of characters |
| B. | string of integers |
| C. | array of characters with integers |
| D. | array of zero’s and one’s |
| Answer» B. string of integers | |
| 131. |
Beyond IP, UDP provides additional services such as |
| A. | routing and switching |
| B. | sending and receiving of packets |
| C. | multiplexing and demultiplexing |
| D. | demultiplexing and error checking |
| Answer» E. | |
| 132. |
Which one of the following is a version of UDP with congestion control? |
| A. | datagram congestion control protocol |
| B. | stream control transmission protocol |
| C. | structured stream transport |
| D. | user congestion control protocol |
| Answer» B. stream control transmission protocol | |
| 133. |
An endpoint of an inter-process communication flow across a computer network is called |
| A. | socket |
| B. | pipe |
| C. | port |
| D. | machine |
| Answer» B. pipe | |
| 134. |
2 USER DATAGRAM PROTOCOLS (UDP) |
| A. | connection-oriented |
| B. | unreliable |
| C. | transport layer protocol |
| D. | low overhead |
| Answer» B. unreliable | |
| 135. |
The                    field determines the lifetime of IPv6 datagram |
| A. | use dual-stack approach |
| B. | tunneling |
| C. | no solution |
| D. | replace the system |
| Answer» C. no solution | |
| 136. |
Which among the following features is |
| A. | hop limit |
| B. | ttl |
| C. | next header |
| D. | type of traffic |
| Answer» B. ttl | |
| 137. |
Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits |
| A. | 96 to 127 |
| B. | 0 to 63 |
| C. | 80 to 95 |
| D. | 64 to 79 |
| Answer» B. 0 to 63 | |
| 138. |
IPv6 does not use                    type of address. |
| A. | broadcast |
| B. | multicast |
| C. | anycast |
| D. | unicast |
| Answer» B. multicast | |
| 139. |
In the IPv6 header, the traffic class field is similar to which field in the IPv4 header? |
| A. | fragmentation field |
| B. | fast-switching |
| C. | tos field |
| D. | option field |
| Answer» D. option field | |
| 140. |
The header length of an IPv6 datagram is |
| A. | 10bytes |
| B. | 25bytes |
| C. | 30bytes |
| D. | 40bytes |
| Answer» E. | |
| 141. |
In OSPF database descriptor packet, which field is used to detect a missing packet? |
| A. | lsa header |
| B. | ms |
| C. | database descriptor sequence number |
| D. | options |
| Answer» D. options | |
| 142. |
In OSPF database descriptor packet, if there are more database descriptor packets in the flow, ‘M’ field is set to |
| A. | 1 |
| B. | 0 |
| C. | more |
| D. | -1 |
| Answer» B. 0 | |
| 143. |
In OSPF database descriptor packet, which field is used to indicate that the router is master? |
| A. | m |
| B. | ms |
| C. | i |
| D. | options |
| Answer» C. i | |
| 144. |
The computation of the shortest path in OSPF is usually done by |
| A. | bellman-ford algorithm |
| B. | routing information protocol |
| C. | dijkstra’s algorithm |
| D. | distance vector routing |
| Answer» D. distance vector routing | |
| 145. |
Which of the following is false with respect to the features of OSPF? |
| A. | support for fixed-length subnetting by including the subnet mask in the routing message |
| B. | more flexible link cost than can range from 1 to 65535 |
| C. | use of designated router |
| D. | distribution of traffic over multiple paths that have equal cost to the destination |
| Answer» B. more flexible link cost than can range from 1 to 65535 | |
| 146. |
In Multicast Routing Protocol, flooding is used to broadcast packets but it creates |
| A. | gaps |
| B. | loops |
| C. | holes |
| D. | links |
| Answer» C. holes | |
| 147. |
In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a |
| A. | graph |
| B. | tree |
| C. | network |
| D. | link |
| Answer» B. tree | |
| 148. |
Several techniques can make size of routing table manageable and also handle issues such as |
| A. | maturity |
| B. | error reporting |
| C. | tunneling |
| D. | security |
| Answer» E. | |
| 149. |
Host-specific routing is used for purposes such as checking route or providing |
| A. | network measures |
| B. | security measures |
| C. | routing measures |
| D. | delivery measures |
| Answer» C. routing measures | |
| 150. |
Protocol is a set of |
| A. | formats |
| B. | procedures |
| C. | formats & procedures |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |