Explore topic-wise MCQs in Computer Science.

This section includes 474 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.

251.

Configuration management can be divided into which two subsystems?

A. reconfiguration and documentation
B. management and configuration
C. documentation and dialing up
D. configuration and dialing up
Answer» B. management and configuration
252.

A stateful firewall maintains a ___________ which is a list of active connections.

A. routing table
B. bridging table
C. state table
D. connection table
Answer» B. bridging table
253.

A 4 byte IP address consists of __________

A. only network address
B. only host address
C. network address & host address
D. network address & mac address
Answer» D. network address & mac address
254.

Discarding policy is mainly done by _______

A. sender
B. receiver
C. router
D. switch
Answer» D. switch
255.

Which Layer is Responsible for Congestion Control?

A. Network Layer
B. Data link Layer
C. Transport Layer
D. Application layer
Answer» D. Application layer
256.

Packet sniffers involve:

A. Active receiver
B. Passive receiver
C. Both of the mentioned
D. None of the mentioned
Answer» C. Both of the mentioned
257.

High speed ethernet works on _________

A. coaxial cable
B. twisted pair cable
C. optical fiber
D. unshielded twisted pair cable
Answer» D. unshielded twisted pair cable
258.

The physical layer is responsible for __________

A. line coding
B. channel coding
C. modulation
D. all of the mentioned
Answer» E.
259.

The main contents of the routing table in datagram networks are ___________

A. source and destination address
B. destination address and output port
C. source address and output port
D. input port and output port
Answer» C. source address and output port
260.

ASK, PSK, FSK, and QAM are examples of encoding.

A. digital-to-digital
B. digital-to-analog
C. analog-to-analog
D. analog-to-digital
Answer» C. analog-to-analog
261.

The physical layer provides __________

A. mechanical specifications of electrical connectors and cables
B. electrical specification of transmission line signal level
C. specification for ir over optical fiber
D. all of the mentioned
Answer» E.
262.

Which organization has authority over interstate and international commercein the communications field?

A. ITU-T
B. IEEE
C. FCC
D. ISOC
Answer» D. ISOC
263.

In an Ethernet local area network, which one of the following statementsisTRUE?

A. A station stops to sense the channel once it starts transmitting a frame.
B. The purpose of the jamming signal is to pad the frames that are smallerthan the minimum frame size.
C. A station continues to transmit the packet even after the collision is detected.
D. The exponential back off mechanism reduces the probability of collision on retransmissions
Answer» E.
264.

UDP is an unreliable protocol.

A. True
B. False
Answer» B. False
265.

What does the java.net.InetAddress class represent?

A. socket
B. ip address
C. protocol
D. mac address
Answer» C. protocol
266.

A _____ is a TCP name for a transport service access point.

A. port
B. pipe
C. node
D. protocol
Answer» B. pipe
267.

Which of the following statements is not applicable for cable internet access?

A. it is a shared broadcast medium
B. it includes hfcs
C. cable modem connects home pc to ethernet port
D. analog signal is converted to digital signal in dslam
Answer» E.
268.

A scatternet can have maximum __________

A. 10 piconets
B. 20 piconets
C. 30 piconets
D. 40 piconets
Answer» B. 20 piconets
269.

The combination of an IP address and a port number is known as ___________.

A. network number
B. socket address
C. subnet mask number
D. MAC address
Answer» C. subnet mask number
270.

User datagram protocol is called connectionless because:

A. all UDP packets are treated independently by transport layer
B. it sends data as a stream of related packets
C. both (a) and (b)
D. none of the mentioned
Answer» B. it sends data as a stream of related packets
271.

Ping can _________

A. measure round-trip time
B. report packet loss
C. report latency
D. all of the mentioned
Answer» E.
272.

What is the network ID for a computer whose IP address is190.148.64.23?

A. 190
B. 190.148
C. 190.148.64
D. None of the above
Answer» C. 190.148.64
273.

_______ can detect burst error of length less than or equal to degree of thepolynomial and detects burst errors that affect odd number of bits.

A. Hamming Code
B. CRC
C. VRC
D. None of the above
Answer» C. VRC
274.

A computer on a 10Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2Mbps. It is initially filled to capacity with 16Megabits. What is the maximum duration for which the computer can transmit at the full 10Mbps?

A. 1.6 seconds
B. 2 seconds
C. 5 seconds
D. 8 seconds
Answer» C. 5 seconds
275.

In a packet switching network, if the message size is 48 bytes and eachpacket contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is .

A. 2 bytes
B. 1 bytes
C. 4 bytes
D. 5 bytes
Answer» E.
276.

The total nodal delay is given by ____________

A. dnodal = dproc – dqueue + dtrans + dprop
B. dnodal = dproc + dtrans – dqueue
C. dnodal = dproc + dqueue + dtrans + dprop
D. dnodal = dproc + dqueue – dtrans – dprop
Answer» D. dnodal = dproc + dqueue – dtrans – dprop
277.

FTP server listens for connection on which port number?

A. 20
B. 21
C. 22
D. 23
Answer» C. 22
278.

What is the full form of CAN?

A. Campus Area Network
B. Cluster Area Network
C. Control Area network
D. both A and B
Answer» E.
279.

Frame relay has only _______

A. physical layer
B. data link layer
C. physical layer and data link layer
D. network layer and data link layer
Answer» D. network layer and data link layer
280.

Find the FTP reply whose message is wrongly matched:

A. 331 – Username OK, password required
B. 425 – Can’t open data connection
C. 452 – Error writing file
D. 452 – Can’t open data connection
Answer» E.
281.

The File Transfer Protocol is built on ______________

A. data centric architecture
B. service oriented architecture
C. client server architecture
D. connection oriented architecture
Answer» D. connection oriented architecture
282.

Which of the following is not associated with the session layer?

A. Dialog control
B. Token management
C. Semantics of the information transmitted
D. Synchronization
Answer» D. Synchronization
283.

The path layer of SONET is responsible for the movement of a signal _________

A. from its optical source to its optical destination
B. across a physical line
C. across a physical section
D. back to its optical source
Answer» C. across a physical section
284.

In wireless network an extended service set is a set of ________

A. connected basic service sets
B. all stations
C. all access points
D. connected access points
Answer» B. all stations
285.

What is the subnet id of a host with an IP address 172.16.66.0/21?

A. 172.16.36.0
B. 172.16.48.0
C. 172.16.64.0
D. 172.16.0.0
Answer» D. 172.16.0.0
286.

The process of keeping addresses in memory for future use is called

A. Routing
B. Resolving
C. Caching
D. None of the above
Answer» D. None of the above
287.

Transmission delay does not depend on _____________

A. packet length
B. distance between the routers
C. transmission rate
D. bandwidth of medium
Answer» C. transmission rate
288.

The maximum size of payload field in ethernet frame is __________

A. 1000 bytes
B. 1200 bytes
C. 1300 bytes
D. 1500 bytes
Answer» E.
289.

Virtual circuit identifier in frame relay is called _______

A. data link connection identifier
B. frame relay identifier
C. cell relay identifier
D. circuit connection identifier
Answer» B. frame relay identifier
290.

The packet sent by a node to the source to inform it of congestion is called _______

A. explicit
B. discard
C. choke
D. backpressure
Answer» D. backpressure
291.

Communication offered by TCP is ________

A. full-duplex
B. half-duplex
C. semi-duplex
D. byte by byte
Answer» B. half-duplex
292.

In Ethernet CSMA/CD, the special bit sequence transmitted by media accessmanagement to handle collision is called

A. Preamble
B. Post amble
C. Jam
D. None of the above
Answer» D. None of the above
293.

Which of the following is a MAC address?

A. 192.166.200.50
B. 00056A:01A01A5CCA7FF60
C. 568, Airport Road
D. 01:A5: BB: A7: FF: 60
Answer» E.
294.

In CRC there is no error if the remainder at the receiver is .

A. equal to the remainder at the sender
B. zero
C. nonzero
D. the quotient at the sender
Answer» C. nonzero
295.

Storage management comprises of _______________

A. san management
B. data protection
C. disk operation
D. all of the mentioned
Answer» E.
296.

Which of the following layers is an addition to OSI model when compared with TCP IPmodel?

A. Application layer
B. Presentation layer
C. Session layer
D. Session and Presentation layer
Answer» E.
297.

The network layer is concerned with __________ of data.

A. bits
B. frames
C. packets
D. bytes
Answer» D. bytes
298.

Which of the following TCP/IP protocol is used for transferringelectronicmail messages from one machine to another?

A. FTP
B. SNMP
C. SMTP
D. RPC
Answer» D. RPC
299.

WiMAX stands for ___________

A. wireless maximum communication
B. worldwide interoperability for microwave access
C. worldwide international standard for microwave access
D. wireless internet maximum communication
Answer» C. worldwide international standard for microwave access
300.

Ethernet in metropolitan area network (MAN) can be used as ___________

A. pure ethernet
B. ethernet over sdh
C. ethernet over mpls
D. all of the mentioned
Answer» E.