MCQOPTIONS
Saved Bookmarks
This section includes 36 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which organization has authority over interstate and international commerce in the communications field? |
| A. | ITU-T |
| B. | IEEE |
| C. | FCC |
| D. | ISOC |
| Answer» D. ISOC | |
| 2. |
Match the following:(P) SMTP (1) Application layer(Q) BGP (2) Transport layer(R) TCP (3) Data link layer(S) PPP (4) Network layer(5) Physical layer |
| A. | P 2 Q 1 R 3 S 5 |
| B. | P 1 Q 4 R 2 S 3 |
| C. | P 1 Q 4 R 2 S 5 |
| D. | P 2 Q 4 R 1 S 3 |
| Answer» C. P 1 Q 4 R 2 S 5 | |
| 3. |
In Ethernet CSMA/CD, the special bit sequence transmitted by media access management to handle collision is called |
| A. | Preamble |
| B. | Post amble |
| C. | Jam |
| D. | None of the above |
| Answer» D. None of the above | |
| 4. |
Sending a file from your personal computer's primary memory or disk to another computer is called |
| A. | uploading |
| B. | downloading |
| C. | logging on |
| D. | hangs on |
| Answer» B. downloading | |
| 5. |
Consider different activities related to email.m1:Send an email from a mail client to mail serverm2:Download an email from mailbox server to a mail clientm3:Checking email in a web browserWhich is the applicable level protocol user in each activity? |
| A. | m1:HTTP, m2:SMTP, m3:POP |
| B. | m1:SMTP, m2:FTP, m3:HTTP |
| C. | m1:SMTP, m2:POP, m3:HTTP |
| D. | m1:POP, m2:SMTP, m3:IMAP |
| Answer» D. m1:POP, m2:SMTP, m3:IMAP | |
| 6. |
Consider different activities related to email. m1:Send an email from a mail client to mail server m2:Download an email from mailbox server to a mail client m3:Checking email in a web browser Which is the applicable level protocol user in each activity? |
| A. | m1:HTTP, m2:SMTP, m3:POP |
| B. | m1:SMTP, m2:FTP, m3:HTTP |
| C. | m1:SMTP, m2:POP, m3:HTTP |
| D. | m1:POP, m2:SMTP, m3:IMAP |
| Answer» D. m1:POP, m2:SMTP, m3:IMAP | |
| 7. |
Which of the following network access standard is used for connecting stations to a circuit-switched network? |
| A. | X.3 |
| B. | X.21 |
| C. | X.25 |
| D. | X.75 |
| Answer» C. X.25 | |
| 8. |
If 5 files are transferred from server A to client B in the same session. The number of TCP connection between A and B is: |
| A. | 5 |
| B. | 10 |
| C. | 2 |
| D. | 6 |
| Answer» E. | |
| 9. |
In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is . |
| A. | 2 bytes |
| B. | 1 bytes |
| C. | 4 bytes |
| D. | 5 bytes |
| Answer» E. | |
| 10. |
In an Ethernet local area network, which one of the following statementsis TRUE? |
| A. | A station stops to sense the channel once it starts transmitting a frame. |
| B. | The purpose of the jamming signal is to pad the frames that are smallerthan the minimum frame size. |
| C. | A station continues to transmit the packet even after the collision is detected. |
| D. | The exponential back off mechanism reduces the probability of collision on retransmissions |
| Answer» E. | |
| 11. |
Piconets in the blue tooth a minimum of two and amaximum of Bluetooth peer devices. |
| A. | five |
| B. | eight |
| C. | nine |
| D. | four |
| Answer» C. nine | |
| 12. |
Piconets in the blue tooth a minimum of two and a maximum of ____________ Bluetooth peer devices. |
| A. | five |
| B. | eight |
| C. | nine |
| D. | four |
| Answer» C. nine | |
| 13. |
If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is . |
| A. | 1 kbps |
| B. | 1.25 kbps |
| C. | 2 kbps |
| D. | 10 kbps |
| Answer» E. | |
| 14. |
If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is __________. |
| A. | 1 kbps |
| B. | 1.25 kbps |
| C. | 2 kbps |
| D. | 10 kbps |
| Answer» E. | |
| 15. |
Which of the following TCP/IP protocol is used for transferringelectronic mail messages from one machine to another? |
| A. | FTP |
| B. | SNMP |
| C. | SMTP |
| D. | RPC |
| Answer» D. RPC | |
| 16. |
What is the maximum size of data that the application layer can pass on to the TCP layer below? |
| A. | Any size |
| B. | 2^16 bytes-size of TCP header |
| C. | 2^16 bytes |
| D. | 1500 bytes |
| Answer» B. 2^16 bytes-size of TCP header | |
| 17. |
Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? |
| A. | FTP |
| B. | SNMP |
| C. | SMTP |
| D. | RPC |
| Answer» D. RPC | |
| 18. |
9 93. Determine the maximum length of the cable (in km) for transmitting data at a rate of 500 Mbps in an Ethernet LAN with frames of size 10,000 bits. Assume the signal speed in the cable to be 2,00,000 km/s. |
| A. | 1 |
| B. | 2 |
| C. | 2.5 |
| D. | 5 |
| Answer» C. 2.5 | |
| 19. |
In the slow start phase of the TCP congestion control algorithm, the size of the congestion window |
| A. | does not increase |
| B. | increases linearly |
| C. | increases quadratically |
| D. | increases exponentially |
| Answer» E. | |
| 20. |
Which one of the following routing algorithm can be used for network layer design? |
| A. | shortest path algorithm |
| B. | distance vector routing |
| C. | link state routing |
| D. | all of the mentioned |
| Answer» E. | |
| 21. |
Which of the following device is used to connect two systems, especiallyif the systems use different protocols? |
| A. | hub |
| B. | bridge |
| C. | gateway |
| D. | repeater |
| Answer» D. repeater | |
| 22. |
Which of the following device is used to connect two systems, especially if the systems use different protocols? |
| A. | hub |
| B. | bridge |
| C. | gateway |
| D. | repeater |
| Answer» D. repeater | |
| 23. |
What will be the efficiency of a Stop and Wait protocol, if the transmission time for a frame is 20ns and the propagation time is 30ns? |
| A. | 20% |
| B. | 25% |
| C. | 40% |
| D. | 66% |
| Answer» C. 40% | |
| 24. |
can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. |
| A. | Hamming Code |
| B. | CRC |
| C. | VRC |
| D. | None of the above |
| Answer» C. VRC | |
| 25. |
_______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. |
| A. | Hamming Code |
| B. | CRC |
| C. | VRC |
| D. | None of the above |
| Answer» C. VRC | |
| 26. |
The communication mode that supports data in both directions at the same time is |
| A. | simplex |
| B. | half-duplex |
| C. | full-duplex |
| D. | multiplex |
| Answer» D. multiplex | |
| 27. |
In OSI model, which of the following layer provides error-free delivery of data? |
| A. | Data link |
| B. | Network |
| C. | transport |
| D. | Session |
| Answer» D. Session | |
| 28. |
A subset of a network that includes all the routers but contains no loops is called: |
| A. | spanning tree |
| B. | spider structure |
| C. | spider tree |
| D. | none of the mentioned |
| Answer» B. spider structure | |
| 29. |
A subset of a network that includes all the routers but contains no loopsis called: |
| A. | spanning tree |
| B. | spider structure |
| C. | spider tree |
| D. | none of the mentioned |
| Answer» B. spider structure | |
| 30. |
An endpoint of an inter-process communication flow across a computer network is called: |
| A. | socket |
| B. | pipe |
| C. | port |
| D. | none of the mentioned |
| Answer» B. pipe | |
| 31. |
In serial data transmission, every byte of data is padded with a 0 in the beginning and one or two 1 s at the end of byte because |
| A. | Receiver is to be synchronized for byte reception |
| B. | Receiver recovers lost 0 and 1 s from these padded bits |
| C. | Padded bits are useful in parity computation |
| D. | None of these |
| Answer» B. Receiver recovers lost 0 and 1 s from these padded bits | |
| 32. |
How many IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192? |
| A. | 62 |
| B. | 126 |
| C. | 192 |
| D. | 254 |
| Answer» B. 126 | |
| 33. |
A small network making up the Internet and also having a small numbers of computers within it is called |
| A. | Host |
| B. | Address |
| C. | Subdomain |
| D. | None of the above |
| Answer» D. None of the above | |
| 34. |
The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard? |
| A. | CSMA/CD |
| B. | Token passing |
| C. | Collision detection |
| D. | Time sharing |
| Answer» C. Collision detection | |
| 35. |
One of the header fields in an IP datagram is the Time to Live (TTL) field. Which of the following statements best explains the need for this field? |
| A. | It can be used to prioritize packets |
| B. | It can be used to reduce delays |
| C. | It can be used to optimize throughput |
| D. | It can be used to prevent packet looping |
| Answer» E. | |
| 36. |
Message Oriented Middleware allows general purpose messages to be exchanged in a Client/Server system using message queues. |
| A. | True |
| B. | False |
| Answer» B. False | |