Explore topic-wise MCQs in Technical Programming.

This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.

601.

If an Optical Carrier is represented as OC-n, generally the link speed equals(in Mbps),

A. n*39.8
B. n*51.8
C. 2n*51.8
D. None of the mentioned
Answer» C. 2n*51.8
602.

Fiber optics posses following properties

A. Immune electromagnetic interference
B. Very less signal attenuation
C. Very hard to tap
D. All of the mentioned
Answer» E.
603.

Coaxial cable consists of _______ concentric copper conductors.

A. 1
B. 2
C. 3
D. 4
Answer» C. 3
604.

UTP is commonly used in

A. DSL
B. FTTP
C. HTTP
D. None of the mentioned
Answer» B. FTTP
605.

Which of this is not a guided media ?

A. Fiber optical cable
B. Coaxial cable
C. Wireless LAN
D. Copper wire
Answer» D. Copper wire
606.

Firewalls are often configured to block

A. UDP traffic
B. TCP traffic
C. Both of the mentioned
D. None of the mentioned
Answer» B. TCP traffic
607.

Sniffers can be deployed in

A. Wired environment
B. WiFi
C. Ethernet LAN
D. All of the mentioned
Answer» E.
608.

Packet sniffers involve

A. Active receiver
B. Passive receiver
C. Both Active receiver and Passive receiver
D. None of the mentioned
Answer» C. Both Active receiver and Passive receiver
609.

The DoS attack is which the attacker sends deluge of packets to the targeted host

A. Vulnerability attack
B. Bandwidth flooding
C. Connection flooding
D. All of the mentioned
Answer» C. Connection flooding
610.

The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the target host

A. Vulnerability attack
B. Bandwidth flooding
C. Connection flooding
D. All of the mentioned
Answer» D. All of the mentioned
611.

Which of the following is a form of DoS attack ?

A. Vulnerability attack
B. Bandwidth flooding
C. Connection flooding
D. All of the mentioned
Answer» E.
612.

The attackers a network of compromised devices known as

A. Internet
B. Botnet
C. Telnet
D. D-net
Answer» C. Telnet
613.

Propagation delay depends on

A. Packet length
B. Transmission rate
C. Distance between the routers
D. None of the mentioned
Answer» D. None of the mentioned
614.

Transmission delay does not depend on

A. Packet length
B. Distance between the routers
C. Transmission rate
D. None of the mentioned
Answer» C. Transmission rate
615.

In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero

A. Propogation delay
B. Queuing delay
C. Transmission delay
D. Processing delay
Answer» C. Transmission delay
616.

The total nodal delay is given by

A. dnodal = dproc – dqueue + dtrans + dprop
B. dnodal = dproc + dtrans – dqueue
C. dnodal = dproc + dqueue + dtrans + dprop
D. dnodal = dproc + dqueue – dtrans – dprop
Answer» D. dnodal = dproc + dqueue – dtrans – dprop
617.

If end to end delay is given by dend-end = N(dproc + dtrans + dprop) is a non congested network. The number of routers between source and destination is

A. N/2
B. N
C. N-1
D. 2N
Answer» D. 2N
618.

In the transfer of file between server and client, if the transmission rates along the path is 10Mbps, 20Mbps, 30Mbps, 40Mbps. The throughput is usually

A. 20Mbps
B. 10Mbps
C. 40Mbps
D. 50Mbps
Answer» C. 40Mbps
619.

Traffic intensity is given by, where L = number of bits in the packet a = average rate R = transmission rate

A. La/R
B. LR/a
C. R/La
D. None of the mentioned
Answer» B. LR/a
620.

The time required to examine the packet’s header and determine where to direct the packet is part of

A. Processing delay
B. Queuing delay
C. Transmission delay
D. All of the mentioned
Answer» B. Queuing delay
621.

For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission delay is(in milliseconds)

A. 3.2
B. 32
C. 0.32
D. None of the mentioned
Answer» B. 32
622.

Which of the following delay is faced by the packet in travelling from one end system to another ?

A. Propagation delay
B. Queuing delay
C. Transmission delay
D. All of the mentioned
Answer» E.
623.

In TDM, the transmission rate of the multiplexed path is usually _______ the sum of the transmission rates of the signal sources.

A. Greater than
B. Lesser than
C. Equal to
D. Equal to or greater than
Answer» B. Lesser than
624.

Multiplexing can provide

A. Efficiency
B. Privacy
C. Anti jamming
D. Both Efficiency & Privacy
Answer» E.
625.

The state when dedicated signals are idle are called

A. Death period
B. Poison period
C. Silent period
D. None of the mentioned
Answer» D. None of the mentioned
626.

If link transmits 4000frames per second, and each slot has 8 bits,the transmission rate of circuit this TDM is

A. 32kbps
B. 500bps
C. 500kbps
D. None of the mentioned
Answer» B. 500bps
627.

If there are n signal sources of same data rate than TDM link has _______ slots

A. n
B. n/2
C. n*2
D. 2n
Answer» B. n/2
628.

Which multiplexing technique transmits digital signals ?

A. FDM
B. TDM
C. WDM
D. None of the mentioned
Answer» C. WDM
629.

Multiplexing is used in _______

A. Packet switching
B. Circuit switching
C. Data switching
D. None of the mentioned
Answer» C. Data switching
630.

The sharing of a medium and its link by two or more devices is called _________

A. Fully duplexing
B. Multiplexing
C. Both Fully duplexing and Multiplexing
D. None of the mentioned
Answer» C. Both Fully duplexing and Multiplexing
631.

Multiplexing technique that shifts each signal to a different carrier frequency

A. FDM
B. TDM
C. Both FDM & TDM
D. None of the mentioned
Answer» B. TDM
632.

In TDM, slots are further divided into

A. Seconds
B. Frames
C. Packets
D. None of the mentioned
Answer» C. Packets
633.

Expand WAN

A. World area network
B. Wide area network
C. Web area network
D. None of the mentioned
Answer» C. Web area network
634.

Data communication system within a building or campus is

A. LAN
B. WAN
C. MAN
D. None of the mentioned
Answer» B. WAN
635.

Data communication system spanning states, countries, or the whole world is

A. LAN
B. WAN
C. MAN
D. None of the mentioned
Answer» C. MAN
636.

This topology requires multipoint connection

A. Star
B. Mesh
C. Ring
D. Bus
Answer» E.
637.

In this topology there is a central controller or hub

A. Star
B. Mesh
C. Ring
D. Bus
Answer» B. Mesh
638.

Physical or logical arrangement of network is

A. Topology
B. Routing
C. Networking
D. None of the mentioned
Answer» B. Routing
639.

Which one of the following is a transport layer protocol?

A. stream control transmission protocol
B. internet control message protocol
C. neighbor discovery protocol
D. dynamic host configuration protocol
Answer» B. internet control message protocol
640.

Transport layer protocols deals with

A. application to application communication
B. process to process communication
C. node to node communication
D. none of the mentioned
Answer» C. node to node communication
641.

A _____ is a TCP name for a transport service access point.

A. port
B. pipe
C. node
D. none of the mentioned
Answer» B. pipe
642.

Which one of the following is a version of UDP with congestion control?

A. datagram congestion control protocol
B. stream control transmission protocol
C. structured stream transport
D. none of the mentioned
Answer» B. stream control transmission protocol
643.

Socket-style API for windows is called

A. wsock
B. winsock
C. wins
D. none of the mentioned
Answer» C. wins
644.

An endpoint of an inter-process communication flow across a computer network is called

A. socket
B. pipe
C. port
D. none of the mentioned
Answer» B. pipe
645.

Transmission control protocol is

A. connection oriented protocol
B. uses a three way handshake to establish a connection
C. recievs data from application as a single stream
D. all of the mentioned
Answer» E.
646.

User datagram protocol is called connectionless because

A. all UDP packets are treated independently by transport layer
B. it sends data as a stream of related packets
C. it is received in the same order as sent order
D. none of the mentioned
Answer» B. it sends data as a stream of related packets
647.

Which one of the following is a transport layer protocol used in networking?

A. TCP
B. UDP
C. Both TCP and UDP
D. None of the mentioned
Answer» D. None of the mentioned
648.

Transport layer aggregates data from different applications into a single stream before passing it to

A. network layer
B. data link layer
C. application layer
D. physical layer
Answer» B. data link layer
649.

ICMP is primarily used for

A. error and diagnostic functions
B. addressing
C. forwarding
D. none of the mentioned
Answer» B. addressing
650.

The network layer protocol of internet is

A. ethernet
B. internet protocol
C. hypertext transfer protocol
D. none of the mentioned
Answer» C. hypertext transfer protocol