Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 304 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

251.

Properties of impulse function are

A. symmetry
B. time scaling
C. shifting
D. all of the mentioned
Answer» E.
252.

In the digital communication system, signals in different frequency bands are

A. orthogonal
B. non orthogonal
C. orthogonal & non orthogonal
D. none of the mentioned
Answer» B. non orthogonal
253.

Wireless transmission of signals can be done via

A. radio waves
B. microwaves
C. infrared
D. all of the mentioned
Answer» E.
254.

A single channel is shared by multiple signals by

A. analog modulation
B. digital modulation
C. multiplexing
D. phase modulation
Answer» D. phase modulation
255.

The physical layer translates logical communication requests from the              into hardware specific operations.

A. data link layer
B. network layer
C. trasnport layer
D. application layer
Answer» B. network layer
256.

The physical layer is responsible for

A. line coding
B. channel coding
C. modulation
D. all of the mentioned
Answer» E.
257.

In asynchronous serial communication the physical layer provides

A. start and stop signalling
B. flow control
C. both start & stop signalling and flow control
D. only start signalling
Answer» D. only start signalling
258.

The physical layer provides

A. mechanical specifications of electrical connectors and cables
B. electrical specification of transmission line signal level
C. specification for ir over optical fiber
D. all of the mentioned
Answer» E.
259.

Bits can be sent over guided and unguided media as analog signal by

A. digital modulation
B. amplitude modulation
C. frequency modulation
D. phase modulation
Answer» B. amplitude modulation
260.

Which transmission media provides the highest transmission speed in a network?

A. coaxial cable
B. twisted pair cable
C. optical fiber
D. electrical cable
Answer» D. electrical cable
261.

Which of the following is an example of network layer vulnerability?

A. mac address spoofing
B. physical theft of data
C. route spoofing
D. weak or non-existent authentication
Answer» D. weak or non-existent authentication
262.

Which of the following is an example of physical layer vulnerability?

A. mac address spoofing
B. physical theft of data
C. route spoofing
D. weak or non-existent authentication
Answer» C. route spoofing
263.

Which of the following is not a vulnerability of the network layer?

A. route spoofing
B. identity & resource id vulnerability
C. ip address spoofing
D. weak or non-existent authentication
Answer» E.
264.

Which of the following is an example of data-link layer vulnerability?

A. mac address spoofing
B. physical theft of data
C. route spoofing
D. weak or non-existent authentication
Answer» B. physical theft of data
265.

                                may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN.

A. switches
B. routers
C. hubs
D. repeaters
Answer» B. routers
266.

                         is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls.

A. vlan attack
B. vlan circumvention
C. vlan compromisation method
D. data-link evading
Answer» C. vlan compromisation method
267.

Which of the following is not a vulnerability of the data-link layer?

A. mac address spoofing
B. vlan circumvention
C. switches may be forced for flooding traffic to all vlan ports
D. overloading of transport-layer mechanisms
Answer» E.
268.

Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer.

A. true
B. false
Answer» B. false
269.

In                                      layer, vulnerabilities are directly associated with physical access to networks and hardware.

A. physical
B. data-link
C. network
D. application
Answer» B. data-link
270.

Which of the following is not physical layer vulnerability?

A. physical theft of data & hardware
B. physical damage or destruction of data & hardware
C. unauthorized network access
D. keystroke & other input logging
Answer» D. keystroke & other input logging
271.

DDP stands for

A. datagram delivery protocol
B. device delivery protocol
C. datagram device protocol
D. device datagram protocol
Answer» B. device delivery protocol
272.

RIP stands for

A. reduced information protocol
B. routing internet protocol
C. routing information protocol
D. reduced internet protocol
Answer» D. reduced internet protocol
273.

The                          model is 7-layer architecture where each layer is having some specific functionality to perform.

A. tcp/ip
B. cloud
C. osi
D. ois
Answer» D. ois
274.

Packets will be transferred in how many types?

A. 5 types
B. 4 types
C. 2 types
D. 3 types
Answer» E.
275.

ICMP stands for

A. internet coordinate message protocol
B. internet control message protocol
C. interconnect control message protocol
D. interconnect coordinate message protocol
Answer» C. interconnect control message protocol
276.

Does network layer in TCP/IP and OSI Model are same.

A. true
B. false
Answer» C.
277.

What are called routers?

A. the devices that operates at session layer
B. the devices that operates at data layer
C. the devices that operates at application layer
D. the devices that operates at network
Answer» E.
278.

The network layer responds to request from which layer?

A. transport layer
B. data layer
C. application layer
D. session layer
Answer» B. data layer
279.

IP is connectionless.

A. true
B. false
Answer» B. false
280.

What are the common protocols associated with the network layer?

A. address resolution protocol
B. reverse address resolution protocol
C. internet protocol
D. neighbour discovery protocol
Answer» D. neighbour discovery protocol
281.

The network layer issues request to which layer?

A. transport layer
B. data layer
C. application layer
D. session layer
Answer» C. application layer
282.

The network layer contains which hardware device?

A. routers, bridges
B. bridges only
C. bridges and switches
D. routers, bridges and switches
Answer» E.
283.

Data in network layer is transferred in the form of

A. layers
B. packets
C. bytes
D. bits
Answer» C. bytes
284.

Which level is the network layer in the OSI model?

A. third level
B. fourth level
C. second level
D. fifth layer
Answer» B. fourth level
285.

Network layer protocol exits in

A. host
B. switches
C. packets
D. bridges
Answer» B. switches
286.

Which one of the following is not used in media access control?

A. ethernet
B. digital subscriber line
C. fiber distributed data interface
D. packet switching
Answer» E.
287.

Which one of the following is not an application layer protocol used in internet?

A. remote procedure call
B. internet relay chat
C. resource reservation protocol
D. local procedure call
Answer» D. local procedure call
288.

Internet works on

A. packet switching
B. circuit switching
C. both packet switching and circuit switching
D. data switching
Answer» B. circuit switching
289.

The size of an IP address in IPv6 is

A. 32 bits
B. 64 bits
C. 128 bits
D. 265 bits
Answer» D. 265 bits
290.

Internet access by transmitting digital data over the wires of a local telephone network is provided by

A. leased line
B. digital subscriber line
C. digital signal line
D. digital leased line
Answer» C. digital signal line
291.

3 OVERVIEW OF INTERNET

A. internet exchange point
B. subscriber end point
C. isp end point
D. internet end point
Answer» B. subscriber end point
292.

           is the multiplexing technique that shifts each signal to a different carrier frequency.

A. fdm
B. tdm
C. both fdm & tdm
D. pdm
Answer» B. tdm
293.

In TDM, slots are further divided into

A. seconds
B. frames
C. packets
D. bits
Answer» C. packets
294.

WAN stands for

A. world area network
B. wide area network
C. web area network
D. web access network
Answer» C. web area network
295.

Data communication system within a building or campus is

A. lan
B. wan
C. man
D. pan
Answer» B. wan
296.

Data communication system spanning states, countries, or the whole world is

A. lan
B. wan
C. man
D. pan
Answer» C. man
297.

               topology requires a multipoint connection.

A. star
B. mesh
C. ring
D. bus
Answer» E.
298.

Which of the following networks extends a private network across public networks?

A. local area network
B. virtual private network
C. enterprise private network
D. storage area network
Answer» C. enterprise private network
299.

A list of protocols used by a system, one protocol per layer, is called

A. protocol architecture
B. protocol stack
C. protocol suite
D. protocol system
Answer» C. protocol suite
300.

A                      is a device that forwards packets between networks by processing the routing information included in the packet.

A. bridge
B. firewall
C. router
D. hub
Answer» D. hub