

MCQOPTIONS
Saved Bookmarks
This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
351. |
What is document object model (DOM)? |
A. | convention for representing and interacting with objects in html documents |
B. | application programming interface |
C. | hierarchy of objects in ASP.NET |
D. | none of the mentioned |
Answer» B. application programming interface | |
352. |
An alternative of javascript on windows platform is |
A. | VBScript |
B. | ASP.NET |
C. | JSP |
D. | None of the mentioned |
Answer» B. ASP.NET | |
353. |
Which one of the following is not used to generate dynamic web pages? |
A. | PHP |
B. | ASP.NET |
C. | JSP |
D. | None of the mentioned |
Answer» E. | |
354. |
A web cookie is a small piece of data |
A. | sent from a website and stored in user’s web browser while a user is browsing a website |
B. | sent from user and stored in the server while a user is browsing a website |
C. | sent from root server to all servers |
D. | none of the mentioned |
Answer» B. sent from user and stored in the server while a user is browsing a website | |
355. |
URL stands for |
A. | unique reference label |
B. | uniform reference label |
C. | uniform resource locator |
D. | unique resource locator |
Answer» D. unique resource locator | |
356. |
Common gateway interface is used to |
A. | generate executable files from web content by web server |
B. | generate web pages |
C. | stream videos |
D. | none of the mentioned |
Answer» B. generate web pages | |
357. |
What is a web browser? |
A. | a program that can display a web page |
B. | a program used to view html documents |
C. | it enables user to access the resources of internet |
D. | all of the mentioned |
Answer» E. | |
358. |
Dynamic web page |
A. | is same every time whenever it displays |
B. | generates on demand by a program or a request from browser |
C. | both is same every time whenever it displays and generates on demand by a program or a request from browser |
D. | none of the mentioned |
Answer» C. both is same every time whenever it displays and generates on demand by a program or a request from browser | |
359. |
A piece of icon or image on a web page associated with another webpage is called |
A. | url |
B. | hyperlink |
C. | plugin |
D. | none of the mentioned |
Answer» C. plugin | |
360. |
Frame relay has only |
A. | physical layer |
B. | data link layer |
C. | both physical layer and data link layer |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
361. |
Frame Relay deploys physical layer carriers such as |
A. | ADMs |
B. | UPSR |
C. | BLSR |
D. | SONET |
Answer» E. | |
362. |
Frame Relay does not provide flow or error control, they must be provided by the |
A. | Lower Level Protocol |
B. | High Level Protocol |
C. | Upper Level Protocol |
D. | Downward Level Protocol |
Answer» D. Downward Level Protocol | |
363. |
There are ________ total features of Frame Relay. |
A. | Five |
B. | Seven |
C. | Nine |
D. | Ten |
Answer» D. Ten | |
364. |
Frame Relay networks offer an option called |
A. | Voice Over For Relay |
B. | Voice Over Fine Relay |
C. | Voice On Frame Relay |
D. | Voice Over Frame Relay |
Answer» E. | |
365. |
Frame Relay is very cheap than other |
A. | LANs |
B. | WANs |
C. | MANs |
D. | Multipoint Networks |
Answer» C. MANs | |
366. |
What is FRAD in frame relay network? |
A. | FRAD assembles and disassembles the frames coming from other protocols |
B. | FRAD is used for modulation and demodulation |
C. | FRAD is used for error detection |
D. | None of the mentioned |
Answer» B. FRAD is used for modulation and demodulation | |
367. |
In frame relay networks, extended address is used |
A. | to increase the range of data link connection identifiers |
B. | for error detection |
C. | for encryption |
D. | for error recovery |
Answer» B. for error detection | |
368. |
Frame relay has |
A. | only physical layer |
B. | only data link layer |
C. | only network layer |
D. | both physical and data link layer |
Answer» E. | |
369. |
Virtual circuit identifier in frame relay is called |
A. | data link connection identifier |
B. | frame relay identifier |
C. | cell relay identifier |
D. | none of the mentioned |
Answer» B. frame relay identifier | |
370. |
Frame relay has error detection at the |
A. | physical layer |
B. | data link layer |
C. | network layer |
D. | transport layer |
Answer» C. network layer | |
371. |
An ATM cell has the payload field of |
A. | 32 bytes |
B. | 48 bytes |
C. | 64 bytes |
D. | 128 bytes |
Answer» C. 64 bytes | |
372. |
ATM can be used for |
A. | local area network |
B. | wide area network |
C. | any of local or wide area network |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
373. |
ATM standard defines _______ layers. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» C. 4 | |
374. |
ATM uses the |
A. | asynchronous frequency division multiplexing |
B. | asynchronous time division multiplexing |
C. | asynchronous space division multiplexing |
D. | none of the mentioned |
Answer» C. asynchronous space division multiplexing | |
375. |
ATM and frame relay are |
A. | virtual circuit networks |
B. | datagram networks |
C. | virtual private networks |
D. | none of the mentioned |
Answer» B. datagram networks | |
376. |
In data transfer phase, the table contains how many columns? |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» E. | |
377. |
In virtual circuit network, delay times for setup and teardown respectively are |
A. | 1 and 1 |
B. | 1 and 2 |
C. | 2 and 1 |
D. | 2 and 2 |
Answer» B. 1 and 2 | |
378. |
Delay if, resource allocated on demand during data transfer is |
A. | Constant |
B. | Increases for each packet |
C. | Same for each packet |
D. | Different for each packet |
Answer» E. | |
379. |
Delay if, resource allocated during setup phase during data transfer is |
A. | Constant |
B. | Increases for each packet |
C. | Same for each packet |
D. | Different for each packet |
Answer» D. Different for each packet | |
380. |
During teardown phase, source after sending all the frames to destination sends……..to notify termination |
A. | Teardown response |
B. | Teardown request |
C. | Termination request |
D. | Termination response |
Answer» C. Termination request | |
381. |
Steps required in setup process are |
A. | Setup request and acknowledgement |
B. | Setup request and setup response |
C. | Setup request and setup termination |
D. | Setup and termination steps |
Answer» B. Setup request and setup response | |
382. |
Which of the following is not a phase of virtual circuit network? |
A. | Setup phase |
B. | Datatransfer phase |
C. | Termination phase |
D. | Teardown phase |
Answer» D. Teardown phase | |
383. |
The Identifier that is used for data transfer in virtual circuit network is |
A. | Global address |
B. | Virtual circuit identifier |
C. | Network identifier |
D. | IP identifier |
Answer» C. Network identifier | |
384. |
The address that is unique in the scope of the network or internationally if the network is part of an international network is called as |
A. | Global address |
B. | Network address |
C. | Physical address |
D. | IP address |
Answer» B. Network address | |
385. |
Which of the following is not a characteristic of Virtual Circuit Network? |
A. | There are setup and teardown phases in addition to the data transfer phase |
B. | Resources can be allocated during setup phase or on demand |
C. | All packets follow the same path established during the connection |
D. | Virtual circuit network is implemented in application layer |
Answer» E. | |
386. |
In the congestion avoidance algorithm, the size of the congestion window increases ____________ until congestion is detected. |
A. | Exponentially |
B. | Additively |
C. | Multiplicatively |
D. | None of the mentioned |
Answer» C. Multiplicatively | |
387. |
In the slow-start algorithm, the size of the congestion window increases __________ until it reaches a threshold. |
A. | Exponentially |
B. | Additively |
C. | Multiplicatively |
D. | None of the mentioned |
Answer» B. Additively | |
388. |
The packet sent by a node to the source to inform it of congestion is called |
A. | Explicit |
B. | Discard |
C. | Choke |
D. | Backpressure |
Answer» D. Backpressure | |
389. |
Backpressure technique can be applied only to |
A. | Congestion networks |
B. | Closed circuit networks |
C. | Open circuit networks |
D. | Virtual circuit networks |
Answer» E. | |
390. |
The technique in which a congested node stops receiving data from the immediate upstream node or nodes is called as |
A. | Admission policy |
B. | Backpressure |
C. | Forward signalling |
D. | Backward signalling |
Answer» C. Forward signalling | |
391. |
Closed-Loop control mechanism try to |
A. | Remove after congestion occurs |
B. | Remove after sometime |
C. | Prevent before congestion occurs |
D. | Prevent before sending packets |
Answer» B. Remove after sometime | |
392. |
Discarding policy is mainly done by |
A. | Sender |
B. | Receiver |
C. | Router |
D. | Switch |
Answer» D. Switch | |
393. |
In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. whereas in Selective Repeat window, tries to send ___________ |
A. | Packet that have not lost |
B. | Packet that have lost or corrupted |
C. | Packet from starting |
D. | All the packets |
Answer» C. Packet from starting | |
394. |
Retransmission of packets must be done when |
A. | Packet is lost |
B. | Packet is corrupted |
C. | Packet is needed |
D. | All of the mentioned |
Answer» E. | |
395. |
In open-loop control, policies are applied to __________ |
A. | Remove after congestion occurs |
B. | Remove after sometime |
C. | Prevent before congestion occurs |
D. | Prevent before sending packets |
Answer» D. Prevent before sending packets | |
396. |
Two broad categories of congestion control are |
A. | Open-loop and Closed-loop |
B. | Open-control and Closed-control |
C. | Active control and Passive control |
D. | None of the mentioned |
Answer» B. Open-control and Closed-control | |
397. |
Which of the following organizations is primarily concerned with military encryption systems? |
A. | NSA |
B. | NIST |
C. | IEEE |
D. | ITU |
Answer» B. NIST | |
398. |
In computer security… means that the information in a computer system only be accessible for reading by authorized parities. |
A. | Confidentiality |
B. | Integrity |
C. | Availability |
D. | Authenticity |
Answer» B. Integrity | |
399. |
In computer security… means that computer system assets can be modified only by authorized parities. |
A. | Confidentiality |
B. | Integrity |
C. | Availability |
D. | Authenticity |
Answer» C. Availability | |
400. |
ESP provides |
A. | source authentication |
B. | data integrity |
C. | privacy |
D. | all of the mentioned |
Answer» E. | |