Explore topic-wise MCQs in Technical Programming.

This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.

351.

What is document object model (DOM)?

A. convention for representing and interacting with objects in html documents
B. application programming interface
C. hierarchy of objects in ASP.NET
D. none of the mentioned
Answer» B. application programming interface
352.

An alternative of javascript on windows platform is

A. VBScript
B. ASP.NET
C. JSP
D. None of the mentioned
Answer» B. ASP.NET
353.

Which one of the following is not used to generate dynamic web pages?

A. PHP
B. ASP.NET
C. JSP
D. None of the mentioned
Answer» E.
354.

A web cookie is a small piece of data

A. sent from a website and stored in user’s web browser while a user is browsing a website
B. sent from user and stored in the server while a user is browsing a website
C. sent from root server to all servers
D. none of the mentioned
Answer» B. sent from user and stored in the server while a user is browsing a website
355.

URL stands for

A. unique reference label
B. uniform reference label
C. uniform resource locator
D. unique resource locator
Answer» D. unique resource locator
356.

Common gateway interface is used to

A. generate executable files from web content by web server
B. generate web pages
C. stream videos
D. none of the mentioned
Answer» B. generate web pages
357.

What is a web browser?

A. a program that can display a web page
B. a program used to view html documents
C. it enables user to access the resources of internet
D. all of the mentioned
Answer» E.
358.

Dynamic web page

A. is same every time whenever it displays
B. generates on demand by a program or a request from browser
C. both is same every time whenever it displays and generates on demand by a program or a request from browser
D. none of the mentioned
Answer» C. both is same every time whenever it displays and generates on demand by a program or a request from browser
359.

A piece of icon or image on a web page associated with another webpage is called

A. url
B. hyperlink
C. plugin
D. none of the mentioned
Answer» C. plugin
360.

Frame relay has only

A. physical layer
B. data link layer
C. both physical layer and data link layer
D. none of the mentioned
Answer» D. none of the mentioned
361.

Frame Relay deploys physical layer carriers such as

A. ADMs
B. UPSR
C. BLSR
D. SONET
Answer» E.
362.

Frame Relay does not provide flow or error control, they must be provided by the

A. Lower Level Protocol
B. High Level Protocol
C. Upper Level Protocol
D. Downward Level Protocol
Answer» D. Downward Level Protocol
363.

There are ________ total features of Frame Relay.

A. Five
B. Seven
C. Nine
D. Ten
Answer» D. Ten
364.

Frame Relay networks offer an option called

A. Voice Over For Relay
B. Voice Over Fine Relay
C. Voice On Frame Relay
D. Voice Over Frame Relay
Answer» E.
365.

Frame Relay is very cheap than other

A. LANs
B. WANs
C. MANs
D. Multipoint Networks
Answer» C. MANs
366.

What is FRAD in frame relay network?

A. FRAD assembles and disassembles the frames coming from other protocols
B. FRAD is used for modulation and demodulation
C. FRAD is used for error detection
D. None of the mentioned
Answer» B. FRAD is used for modulation and demodulation
367.

In frame relay networks, extended address is used

A. to increase the range of data link connection identifiers
B. for error detection
C. for encryption
D. for error recovery
Answer» B. for error detection
368.

Frame relay has

A. only physical layer
B. only data link layer
C. only network layer
D. both physical and data link layer
Answer» E.
369.

Virtual circuit identifier in frame relay is called

A. data link connection identifier
B. frame relay identifier
C. cell relay identifier
D. none of the mentioned
Answer» B. frame relay identifier
370.

Frame relay has error detection at the

A. physical layer
B. data link layer
C. network layer
D. transport layer
Answer» C. network layer
371.

An ATM cell has the payload field of

A. 32 bytes
B. 48 bytes
C. 64 bytes
D. 128 bytes
Answer» C. 64 bytes
372.

ATM can be used for

A. local area network
B. wide area network
C. any of local or wide area network
D. none of the mentioned
Answer» D. none of the mentioned
373.

ATM standard defines _______ layers.

A. 2
B. 3
C. 4
D. 5
Answer» C. 4
374.

ATM uses the

A. asynchronous frequency division multiplexing
B. asynchronous time division multiplexing
C. asynchronous space division multiplexing
D. none of the mentioned
Answer» C. asynchronous space division multiplexing
375.

ATM and frame relay are

A. virtual circuit networks
B. datagram networks
C. virtual private networks
D. none of the mentioned
Answer» B. datagram networks
376.

In data transfer phase, the table contains how many columns?

A. 1
B. 2
C. 3
D. 4
Answer» E.
377.

In virtual circuit network, delay times for setup and teardown respectively are

A. 1 and 1
B. 1 and 2
C. 2 and 1
D. 2 and 2
Answer» B. 1 and 2
378.

Delay if, resource allocated on demand during data transfer is

A. Constant
B. Increases for each packet
C. Same for each packet
D. Different for each packet
Answer» E.
379.

Delay if, resource allocated during setup phase during data transfer is

A. Constant
B. Increases for each packet
C. Same for each packet
D. Different for each packet
Answer» D. Different for each packet
380.

During teardown phase, source after sending all the frames to destination sends……..to notify termination

A. Teardown response
B. Teardown request
C. Termination request
D. Termination response
Answer» C. Termination request
381.

Steps required in setup process are

A. Setup request and acknowledgement
B. Setup request and setup response
C. Setup request and setup termination
D. Setup and termination steps
Answer» B. Setup request and setup response
382.

Which of the following is not a phase of virtual circuit network?

A. Setup phase
B. Datatransfer phase
C. Termination phase
D. Teardown phase
Answer» D. Teardown phase
383.

The Identifier that is used for data transfer in virtual circuit network is

A. Global address
B. Virtual circuit identifier
C. Network identifier
D. IP identifier
Answer» C. Network identifier
384.

The address that is unique in the scope of the network or internationally if the network is part of an international network is called as

A. Global address
B. Network address
C. Physical address
D. IP address
Answer» B. Network address
385.

Which of the following is not a characteristic of Virtual Circuit Network?

A. There are setup and teardown phases in addition to the data transfer phase
B. Resources can be allocated during setup phase or on demand
C. All packets follow the same path established during the connection
D. Virtual circuit network is implemented in application layer
Answer» E.
386.

In the congestion avoidance algorithm, the size of the congestion window increases ____________ until congestion is detected.

A. Exponentially
B. Additively
C. Multiplicatively
D. None of the mentioned
Answer» C. Multiplicatively
387.

In the slow-start algorithm, the size of the congestion window increases __________ until it reaches a threshold.

A. Exponentially
B. Additively
C. Multiplicatively
D. None of the mentioned
Answer» B. Additively
388.

The packet sent by a node to the source to inform it of congestion is called

A. Explicit
B. Discard
C. Choke
D. Backpressure
Answer» D. Backpressure
389.

Backpressure technique can be applied only to

A. Congestion networks
B. Closed circuit networks
C. Open circuit networks
D. Virtual circuit networks
Answer» E.
390.

The technique in which a congested node stops receiving data from the immediate upstream node or nodes is called as

A. Admission policy
B. Backpressure
C. Forward signalling
D. Backward signalling
Answer» C. Forward signalling
391.

Closed-Loop control mechanism try to

A. Remove after congestion occurs
B. Remove after sometime
C. Prevent before congestion occurs
D. Prevent before sending packets
Answer» B. Remove after sometime
392.

Discarding policy is mainly done by

A. Sender
B. Receiver
C. Router
D. Switch
Answer» D. Switch
393.

In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. whereas in Selective Repeat window, tries to send ___________

A. Packet that have not lost
B. Packet that have lost or corrupted
C. Packet from starting
D. All the packets
Answer» C. Packet from starting
394.

Retransmission of packets must be done when

A. Packet is lost
B. Packet is corrupted
C. Packet is needed
D. All of the mentioned
Answer» E.
395.

In open-loop control, policies are applied to __________

A. Remove after congestion occurs
B. Remove after sometime
C. Prevent before congestion occurs
D. Prevent before sending packets
Answer» D. Prevent before sending packets
396.

Two broad categories of congestion control are

A. Open-loop and Closed-loop
B. Open-control and Closed-control
C. Active control and Passive control
D. None of the mentioned
Answer» B. Open-control and Closed-control
397.

Which of the following organizations is primarily concerned with military encryption systems?

A. NSA
B. NIST
C. IEEE
D. ITU
Answer» B. NIST
398.

In computer security… means that the information in a computer system only be accessible for reading by authorized parities.

A. Confidentiality
B. Integrity
C. Availability
D. Authenticity
Answer» B. Integrity
399.

In computer security… means that computer system assets can be modified only by authorized parities.

A. Confidentiality
B. Integrity
C. Availability
D. Authenticity
Answer» C. Availability
400.

ESP provides

A. source authentication
B. data integrity
C. privacy
D. all of the mentioned
Answer» E.