Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 304 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

151.

LSP stands for

A. link stable packet
B. link state packet
C. link state protocol
D. link state path
Answer» C. link state protocol
152.

Next-Hop Method is used to reduce contents of a

A. revolving table
B. rotating table
C. routing table
D. re-allocate table
Answer» D. re-allocate table
153.

In Unicast routing, if instability is between three nodes, stability cannot be

A. stable
B. reversed
C. guaranteed
D. forward
Answer» D. forward
154.

A second technique to reduce routing table and simplify searching process is called

A. network-specific method
B. network-specific motion
C. network-specific maintaining
D. network-specific membership
Answer» B. network-specific motion
155.

The term that is used to place packet in its route to its destination is called

A. delayed
B. urgent
C. forwarding
D. delivering
Answer» D. delivering
156.

In Novell’s use of RIP, there are two metrics used to make routing decisions. Select the correct metrics.

A. ticks & hops
B. hops & loops
C. loops & counts
D. counts & ticks
Answer» B. hops & loops
157.

Novell’s implementation of RIP updates routing tables every                    seconds.

A. 60
B. 90
C. 10
D. 30
Answer» B. 90
158.

To prevent Service Advertisements (SAPs) from flooding a network, Cisco routers do not forward them. How are services advertised to other networks?

A. each router builds its own sap table and forwards that every 60 seconds
B. each router assigns a service number and broadcasts that
C. saps aren’t necessary with cisco routers
D. cisco routers filter out all saps
Answer» B. each router assigns a service number and broadcasts that
159.

By default, Cisco routers forward GNS SAPs to remote networks.

A. false
B. true
Answer» B. true
160.

As a system administrator, you need to set up one Ethernet interface on the Cisco router to allow for both sap and Novell-ether encapsulations. Which set of commands will accomplish this?

A. interface ethernet 0.1 ipx encapsulation novell-ether ipx network 9e interface ethernet 0.2 ipx network 6c
B. interface ethernet 0 ipx encapsulation novell-ether ipx network 9e interface ethernet 0 ipx encapsulation sap ipx network 6c
C. interface ethernet 0.1 ipx encapsulation novell-ether interface ethernet 0.2 ipx encapsulation sap
D. interface ethernet 0.1ipx encapsulation novell-ether ipx network 9e interface ethernet 0.2 ipx encapsulation sap ipx network 6c
Answer» E.
161.

You want to enable both arpa and snap encapsulation on one router interface. How do you do this?

A. the interface can handle multiple encapsulation types with no extra configuration
B. assign two network numbers, one for each encapsulation type
C. enable novell-ether to run multiple encapsulation types
D. both arpa and snap are enabled by default so you don’t have to configure anything
Answer» C. enable novell-ether to run multiple encapsulation types
162.

As a system administrator, you want to debug IGRP but are worried that the “debug IP IGRP transaction” command will flood the console. What is the command that you should use?

A. debug ip igrp event
B. debug ip igrp-events
C. debug ip igrp summary
D. debug ip igrp events
Answer» E.
163.

Which NetWare protocol works on layer 3– network layer—of the OSI model?

A. ipx
B. ncp
C. spx
D. netbios
Answer» B. ncp
164.

Which NetWare protocol provides link- state routing?

A. nlsp
B. rip
C. sap
D. ncp
Answer» B. rip
165.

Consider a situation in which you are a system administrator on a NetWare network, you are running NetWare 4.11 and you cannot communicate with your router. What is the likely problem?

A. netware 4.11 defaults to 802.2 encapsulation
B. netware 4.11 defaults to 802.3 encapsulation
C. cisco routers only work with netware 3.11
D. netware 3.11 defaults to 802.2 encapsulation
Answer» B. netware 4.11 defaults to 802.3 encapsulation
166.

The network layer protocol for internet is

A. ethernet
B. internet protocol
C. hypertext transfer protocol
D. file transfer protocol
Answer» C. hypertext transfer protocol
167.

Which one of the following algorithm is not used for congestion control?

A. traffic aware routing
B. admission control
C. load shedding
D. routing information protocol
Answer» E.
168.

Which of the following field in IPv4 datagram is not related to fragmentation?

A. flags
B. offset
C. tos
D. identifier
Answer» D. identifier
169.

The TTL field has value 10. How many routers (max) can process this datagram?

A. 11
B. 5
C. 10
D. 1
Answer» D. 1
170.

If the value in protocol field is 17, the transport layer protocol used is

A. tcp
B. udp
C. icmp
D. igmp
Answer» C. icmp
171.

In                    systems, resources are allocated on demand.

A. packet switching
B. circuit switching
C. line switching
D. frequency switching
Answer» B. circuit switching
172.

As the resources are reserved between two communicating end systems in circuit switching,                        is achieved.

A. authentication
B. guaranteed constant rate
C. reliability
D. store and forward
Answer» C. reliability
173.

The required resources for communication between end systems are reserved for the duration of the session between end systems in                  method.

A. packet switching
B. circuit switching
C. line switching
D. frequency switching
Answer» C. line switching
174.

If there are N routers from source to destination, the total end to end delay in sending packet P(L-> number of bits in the packet R-> transmission rate) is equal to

A. n
B. (n*l)/r
C. (2n*l)/r
D. l/r
Answer» C. (2n*l)/r
175.

Most packet switches use this principle

A. stop and wait
B. store and forward
C. store and wait
D. stop and forward
Answer» C. store and wait
176.

ICMP is primarily used for

A. error and diagnostic functions
B. addressing
C. forwarding
D. routing
Answer» B. addressing
177.

A subset of a network that includes all the routers but contains no loops is called

A. spanning tree
B. spider structure
C. spider tree
D. special tree
Answer» B. spider structure
178.

In virtual circuit network each packet contains

A. full source and destination address
B. a short vc number
C. only source address
D. only destination address
Answer» C. only source address
179.

A 4 byte IP address consists of

A. wired sensor network
B. wireless sensor network
C. wired service network
D. wireless service network
Answer» C. wired service network
180.

Number of methods in CoAP?

A. 2
B. 5
C. 4
D. 3
Answer» D. 3
181.

How many messages types are there in CoAP?

A. 2
B. 5
C. 3
D. 4
Answer» E.
182.

CoAP messages are short.

A. true
B. false
Answer» B. false
183.

Which protocol interacts asynchronously over UDP?

A. hmtp
B. coap
C. mqtt
D. tcp/ip
Answer» C. mqtt
184.

Adheres to                  approach for managing resources and support mapping to HTTP.

A. retful
B. iot
C. restful
D. restful
Answer» E.
185.

                 resources are identified by Uniform Resource Identifiers.

A. coap
B. hmtp
C. mqtt
D. tcp/ip
Answer» B. hmtp
186.

                 is an application layer protocol for resource constrained devices.

A. coap
B. hmtp
C. mqtt
D. tcp/ip
Answer» B. hmtp
187.

                 supports low energy radio operation.

A. ietf 6lowpan
B. ieft coap
C. rfid/nfc
D. bluetooth
Answer» E.
188.

                 tags, devices, smart phones useful in identification.

A. ietf 6lowpan
B. ieft coap
C. rfid/nfc
D. ieee 802.15.4.lowpan
Answer» D. ieee 802.15.4.lowpan
189.

                 enables open application layer for constrained nodes.

A. ietf 6lowpan
B. ieft coap
C. rfid/nfc
D. ieee 802.15.4.lowpan
Answer» C. rfid/nfc
190.

                 specification defining the PHY and MAC layer of low power devices.

A. ietf 6lowpan
B. ieft coap
C. rfid/nfc
D. ieee 802.15.4.lowpan
Answer» E.
191.

                 enables seamless integration of LoWPAN devices with internet leveraging.

A. ietf 6lowpan
B. ieft coap
C. rfid/nfc
D. ieee 802.15.4.lowpan
Answer» B. ieft coap
192.

Which protocol is used to link all the devices in the IoT?

A. tcp/ip
B. network
C. udp
D. http
Answer» B. network
193.

What is the access point (AP) in a wireless LAN?

A. device that allows wireless devices to connect to a wired network
B. wireless devices itself
C. both device that allows wireless devices to connect to a wired network and wireless devices itself
D. all the nodes in the network
Answer» B. wireless devices itself
194.

Bluetooth supports

A. point-to-point connections
B. point-to-multipoint connection
C. both point-to-point connections and point- to-multipoint connection
D. multipoint to point connection
Answer» D. multipoint to point connection
195.

A scatternet can have maximum

A. 10 piconets
B. 20 piconets
C. 30 piconets
D. 40 piconets
Answer» B. 20 piconets
196.

Unauthorised access of information from a wireless device through a bluetooth connection is called

A. bluemaking
B. bluesnarfing
C. bluestring
D. bluescoping
Answer» C. bluestring
197.

Bluetooth uses

A. frequency hopping spread spectrum
B. orthogonal frequency division multiplexing
C. time division multiplexing
D. channel division multiplexing
Answer» B. orthogonal frequency division multiplexing
198.

An interconnected collection of piconet is called

A. scatternet
B. micronet
C. mininet
D. multinet
Answer» B. micronet
199.

Bluetooth is the wireless technology for

A. local area network
B. personal area network
C. metropolitan area network
D. wide area network
Answer» C. metropolitan area network
200.

Which tells about signalling?

A. v series
B. x series
C. g series
D. q series
Answer» E.