MCQOPTIONS
Saved Bookmarks
This section includes 474 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which one of the below is not an component of Internet mail system |
| A. | user agent |
| B. | smtp sender |
| C. | smtp receiver |
| D. | transfer agent |
| Answer» E. | |
| 2. |
A standard mechanism provided by internet which helps in copying a file from one host to another is known as ________. |
| A. | smtp |
| B. | dns server |
| C. | telnet |
| D. | ftp |
| Answer» E. | |
| 3. |
The data bit to be transmitted are broken into discrete __________ at the data link layer. |
| A. | frame |
| B. | stuff |
| C. | character |
| D. | data |
| Answer» B. stuff | |
| 4. |
A field in header is used to specify the number of characters in the frame. |
| A. | start bit |
| B. | character count |
| C. | end bit |
| D. | character stuffing |
| Answer» C. end bit | |
| 5. |
Which of the following are not duties of Physical layer |
| A. | bit rate control |
| B. | multiplexing |
| C. | error detection |
| D. | circuit switching |
| Answer» D. circuit switching | |
| 6. |
Below layers are not present in TCP/IP layer. |
| A. | application |
| B. | presentation |
| C. | transport |
| D. | network |
| Answer» C. transport | |
| 7. |
Presentation doesn’t perform ________ function |
| A. | translation |
| B. | transmission |
| C. | encryption |
| D. | compression |
| Answer» C. encryption | |
| 8. |
____________ media is a communication medium which allows the data to get guided along it. |
| A. | transparent |
| B. | cable |
| C. | guided |
| D. | glass |
| Answer» D. glass | |
| 9. |
which of the following is not Guided transmission media |
| A. | twisted pair cables |
| B. | co-axial cables |
| C. | infrared |
| D. | fibre optics |
| Answer» D. fibre optics | |
| 10. |
The operation of ____________ is based on signals which are multiplexed and added in time domain butthey occupy different slots in frequency domain |
| A. | fdm |
| B. | tdm |
| C. | wdm |
| D. | mdm |
| Answer» B. tdm | |
| 11. |
The ____ field determines the lifetime of IPv6 datagram |
| A. | hop limit |
| B. | ttl |
| C. | next header |
| D. | none of the mentioned |
| Answer» B. ttl | |
| 12. |
IPv6 doesnot use ______ type of address |
| A. | broadcast |
| B. | multicast |
| C. | anycast |
| D. | none of the mentioned |
| Answer» B. multicast | |
| 13. |
The header length of an IPv6 datagram is _____. |
| A. | 10bytes |
| B. | 25bytes |
| C. | 30bytes |
| D. | 40bytes |
| Answer» E. | |
| 14. |
If the value in protocol field is 17, the transport layer protocol used is ____. |
| A. | tcp |
| B. | udp |
| C. | either of the mentioned |
| D. | none of the mentioned |
| Answer» C. either of the mentioned | |
| 15. |
The HTTP response message leaves out the requested object when _____ method is used |
| A. | get |
| B. | post |
| C. | head |
| D. | put |
| Answer» D. put | |
| 16. |
The values GET, POST, HEAD etc are specified in ____ of HTTP message |
| A. | request line |
| B. | header line |
| C. | status line |
| D. | entity body |
| Answer» B. header line | |
| 17. |
The first line of HTTP request message is called ____ |
| A. | request line |
| B. | header line |
| C. | status line |
| D. | entity line |
| Answer» B. header line | |
| 18. |
The password is sent to the server using _____ command |
| A. | passwd |
| B. | pass |
| C. | password |
| D. | none of the mentioned |
| Answer» C. password | |
| 19. |
The commands, from client to server, and replies, from server to client, are sent across the control connection in ____ bit ASCII format |
| A. | 8 |
| B. | 7 |
| C. | 3 |
| D. | 5 |
| Answer» C. 3 | |
| 20. |
FTP uses _____ parallel TCP connections to transfer a file |
| A. | 1 |
| B. | 2 |
| C. | 3 |
| D. | 4 |
| Answer» C. 3 | |
| 21. |
_____ command is used to manipulate TCP/IP routing table. |
| A. | route |
| B. | ipconfig |
| C. | ifconfig |
| D. | traceroute |
| Answer» B. ipconfig | |
| 22. |
An RTP header has a minimum size of |
| A. | 12 bytes |
| B. | 16 bytes |
| C. | 24 bytes |
| D. | 32 bytes |
| Answer» B. 16 bytes | |
| 23. |
RTP provides the facility of jitter ____ . |
| A. | compensation |
| B. | expansion |
| C. | both (a) and (b) |
| D. | none of the mentioned |
| Answer» B. expansion | |
| 24. |
The sharing of a medium and its link by two or more devices is called _______ |
| A. | fully duplexing |
| B. | multiplexing |
| C. | both a and b |
| D. | none of the mentioned |
| Answer» C. both a and b | |
| 25. |
Transport layer protocols deals with |
| A. | application to application communication |
| B. | process to process communication |
| C. | node to node communication |
| D. | none of the mentioned |
| Answer» C. node to node communication | |
| 26. |
The data link layer takes the packets from _____ and encapsulates them into frames for transmission. |
| A. | network layer |
| B. | physical layer |
| C. | transport layer |
| D. | application layer |
| Answer» B. physical layer | |
| 27. |
The OSI model has ___ layers. |
| A. | 4 |
| B. | 5 |
| C. | 6 |
| D. | 7 |
| Answer» E. | |
| 28. |
Transport layer of OSI model lies between Network and ___________ layer |
| A. | Application |
| B. | Data link |
| C. | Session |
| D. | Presentation |
| Answer» D. Presentation | |
| 29. |
The ______ field is used to detect errors over the entire user datagram. |
| A. | udp header |
| B. | checksum |
| C. | source port |
| D. | destination port |
| Answer» C. source port | |
| 30. |
VPNs are financially speaking __________ |
| A. | always more expensive than leased lines |
| B. | always cheaper than leased lines |
| C. | usually cheaper than leased lines |
| D. | usually more expensive than leased lines |
| Answer» D. usually more expensive than leased lines | |
| 31. |
URL stands for ________ |
| A. | unique reference label |
| B. | uniform reference label |
| C. | uniform resource locator |
| D. | unique resource locator |
| Answer» D. unique resource locator | |
| 32. |
In RPC, while a server is processing the call, the client is blocked ________ |
| A. | unless the client sends an asynchronous request to the server |
| B. | unless the call processing is complete |
| C. | for the complete duration of the connection |
| D. | unless the server is disconnected |
| Answer» B. unless the call processing is complete | |
| 33. |
Bluetooth uses __________ |
| A. | frequency hopping spread spectrum |
| B. | orthogonal frequency division multiplexing |
| C. | time division multiplexing |
| D. | channel division multiplexing |
| Answer» B. orthogonal frequency division multiplexing | |
| 34. |
SMTP defines _______ |
| A. | message transport |
| B. | message encryption |
| C. | message content |
| D. | message password |
| Answer» B. message encryption | |
| 35. |
Automatic protection switching in linear network is defined at the _______ |
| A. | line layer |
| B. | section layer |
| C. | photonic layer |
| D. | path layer |
| Answer» B. section layer | |
| 36. |
A modulator converts a signal to a(n) signal. |
| A. | FSK; PSK |
| B. | PSK; FSK |
| C. | analog; digital |
| D. | digital; analog |
| Answer» D. digital; analog | |
| 37. |
If a file consisting of 50,000 characters takes 40 seconds to send, then thedata rate is __________. |
| A. | 1 kbps |
| B. | 1.25 kbps |
| C. | 2 kbps |
| D. | 10 kbps |
| Answer» E. | |
| 38. |
Header size of the ICMP message is _________ |
| A. | 8-bytes |
| B. | 8-bits |
| C. | 16-bytes |
| D. | 16-bits |
| Answer» B. 8-bits | |
| 39. |
A subset of a network that includes all the routers but contains no loopsiscalled: |
| A. | spanning tree |
| B. | spider structure |
| C. | spider tree |
| D. | none of the mentioned |
| Answer» B. spider structure | |
| 40. |
Consider different activities related to email.m1:Send an email from a mail client to mail server m2:Download an email from mailbox server to a mail client m3:Checking email in a web browser Which is the applicable level protocol user in each activity? |
| A. | m1:HTTP, m2:SMTP, m3:POP |
| B. | m1:SMTP, m2:FTP, m3:HTTP |
| C. | m1:SMTP, m2:POP, m3:HTTP |
| D. | m1:POP, m2:SMTP, m3:IMAP |
| Answer» D. m1:POP, m2:SMTP, m3:IMAP | |
| 41. |
An RTP session is established for ____________ |
| A. | each media stream |
| B. | all media streams |
| C. | some predefined number of media streams |
| D. | no media stream |
| Answer» B. all media streams | |
| 42. |
AJAX stands for _______ |
| A. | asynchronous javascript and xml |
| B. | advanced jsp and xml |
| C. | asynchronous jsp and xml |
| D. | advanced javascript and xml |
| Answer» B. advanced jsp and xml | |
| 43. |
Datagrams are routed to their destinations with the help of ________ |
| A. | switch table |
| B. | segments table |
| C. | datagram table |
| D. | routing table |
| Answer» D. routing table | |
| 44. |
A is a device that forwards packets between networks by processing the routing information included in the packet. |
| A. | Bridge |
| B. | Firewall |
| C. | Router |
| D. | Hub |
| Answer» D. Hub | |
| 45. |
Pure ALOHA has a maximum throughput of ----------- |
| A. | 16.4 % |
| B. | 18.4 % |
| C. | 7.4 % |
| D. | 1 % |
| Answer» C. 7.4 % | |
| 46. |
Find the FTP reply whose message is wrongly matched. |
| A. | 331 – username ok, password required |
| B. | 425 – can’t open data connection |
| C. | 452 – error writing file |
| D. | 452 – can’t open data connection |
| Answer» E. | |
| 47. |
Bluetooth is the wireless technology for __________ |
| A. | local area network |
| B. | personal area network |
| C. | metropolitan area network |
| D. | wide area network |
| Answer» C. metropolitan area network | |
| 48. |
Physical layer provides: |
| A. | mechanical specifications of electrical connectors and cables |
| B. | electrical specification of transmission line signal level |
| C. | specification for IR over optical fiber |
| D. | all of the mentioned |
| Answer» E. | |
| 49. |
Network congestion occurs _________ |
| A. | in case of traffic overloading |
| B. | when a system terminates |
| C. | when connection between two nodes terminates |
| D. | in case of transfer failure |
| Answer» B. when a system terminates | |
| 50. |
In a piconet, one master device ________ |
| A. | can not be slave |
| B. | can be slave in another piconet |
| C. | can be slave in the same piconet |
| D. | can be master in another piconet |
| Answer» C. can be slave in the same piconet | |