Explore topic-wise MCQs in Computer Science.

This section includes 474 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.

1.

Which one of the below is not an component of Internet mail system

A. user agent
B. smtp sender
C. smtp receiver
D. transfer agent
Answer» E.
2.

A standard mechanism provided by internet which helps in copying a file from one host to another is known as ________.

A. smtp
B. dns server
C. telnet
D. ftp
Answer» E.
3.

The data bit to be transmitted are broken into discrete __________ at the data link layer.

A. frame
B. stuff
C. character
D. data
Answer» B. stuff
4.

A field in header is used to specify the number of characters in the frame.

A. start bit
B. character count
C. end bit
D. character stuffing
Answer» C. end bit
5.

Which of the following are not duties of Physical layer

A. bit rate control
B. multiplexing
C. error detection
D. circuit switching
Answer» D. circuit switching
6.

Below layers are not present in TCP/IP layer.

A. application
B. presentation
C. transport
D. network
Answer» C. transport
7.

Presentation doesn’t perform ________ function

A. translation
B. transmission
C. encryption
D. compression
Answer» C. encryption
8.

____________ media is a communication medium which allows the data to get guided along it.

A. transparent
B. cable
C. guided
D. glass
Answer» D. glass
9.

which of the following is not Guided transmission media

A. twisted pair cables
B. co-axial cables
C. infrared
D. fibre optics
Answer» D. fibre optics
10.

The operation of ____________ is based on signals which are multiplexed and added in time domain butthey occupy different slots in frequency domain

A. fdm
B. tdm
C. wdm
D. mdm
Answer» B. tdm
11.

The ____ field determines the lifetime of IPv6 datagram

A. hop limit
B. ttl
C. next header
D. none of the mentioned
Answer» B. ttl
12.

IPv6 doesnot use ______ type of address

A. broadcast
B. multicast
C. anycast
D. none of the mentioned
Answer» B. multicast
13.

The header length of an IPv6 datagram is _____.

A. 10bytes
B. 25bytes
C. 30bytes
D. 40bytes
Answer» E.
14.

If the value in protocol field is 17, the transport layer protocol used is ____.

A. tcp
B. udp
C. either of the mentioned
D. none of the mentioned
Answer» C. either of the mentioned
15.

The HTTP response message leaves out the requested object when _____ method is used

A. get
B. post
C. head
D. put
Answer» D. put
16.

The values GET, POST, HEAD etc are specified in ____ of HTTP message

A. request line
B. header line
C. status line
D. entity body
Answer» B. header line
17.

The first line of HTTP request message is called ____

A. request line
B. header line
C. status line
D. entity line
Answer» B. header line
18.

The password is sent to the server using _____ command

A. passwd
B. pass
C. password
D. none of the mentioned
Answer» C. password
19.

The commands, from client to server, and replies, from server to client, are sent across the control connection in ____ bit ASCII format

A. 8
B. 7
C. 3
D. 5
Answer» C. 3
20.

FTP uses _____ parallel TCP connections to transfer a file

A. 1
B. 2
C. 3
D. 4
Answer» C. 3
21.

_____ command is used to manipulate TCP/IP routing table.

A. route
B. ipconfig
C. ifconfig
D. traceroute
Answer» B. ipconfig
22.

An RTP header has a minimum size of

A. 12 bytes
B. 16 bytes
C. 24 bytes
D. 32 bytes
Answer» B. 16 bytes
23.

RTP provides the facility of jitter ____ .

A. compensation
B. expansion
C. both (a) and (b)
D. none of the mentioned
Answer» B. expansion
24.

The sharing of a medium and its link by two or more devices is called _______

A. fully duplexing
B. multiplexing
C. both a and b
D. none of the mentioned
Answer» C. both a and b
25.

Transport layer protocols deals with

A. application to application communication
B. process to process communication
C. node to node communication
D. none of the mentioned
Answer» C. node to node communication
26.

The data link layer takes the packets from _____ and encapsulates them into frames for transmission.

A. network layer
B. physical layer
C. transport layer
D. application layer
Answer» B. physical layer
27.

The OSI model has ___ layers.

A. 4
B. 5
C. 6
D. 7
Answer» E.
28.

Transport layer of OSI model lies between Network and ___________ layer

A. Application
B. Data link
C. Session
D. Presentation
Answer» D. Presentation
29.

The ______ field is used to detect errors over the entire user datagram.

A. udp header
B. checksum
C. source port
D. destination port
Answer» C. source port
30.

VPNs are financially speaking __________

A. always more expensive than leased lines
B. always cheaper than leased lines
C. usually cheaper than leased lines
D. usually more expensive than leased lines
Answer» D. usually more expensive than leased lines
31.

URL stands for ________

A. unique reference label
B. uniform reference label
C. uniform resource locator
D. unique resource locator
Answer» D. unique resource locator
32.

In RPC, while a server is processing the call, the client is blocked ________

A. unless the client sends an asynchronous request to the server
B. unless the call processing is complete
C. for the complete duration of the connection
D. unless the server is disconnected
Answer» B. unless the call processing is complete
33.

Bluetooth uses __________

A. frequency hopping spread spectrum
B. orthogonal frequency division multiplexing
C. time division multiplexing
D. channel division multiplexing
Answer» B. orthogonal frequency division multiplexing
34.

SMTP defines _______

A. message transport
B. message encryption
C. message content
D. message password
Answer» B. message encryption
35.

Automatic protection switching in linear network is defined at the _______

A. line layer
B. section layer
C. photonic layer
D. path layer
Answer» B. section layer
36.

A modulator converts a signal to a(n) signal.

A. FSK; PSK
B. PSK; FSK
C. analog; digital
D. digital; analog
Answer» D. digital; analog
37.

If a file consisting of 50,000 characters takes 40 seconds to send, then thedata rate is __________.

A. 1 kbps
B. 1.25 kbps
C. 2 kbps
D. 10 kbps
Answer» E.
38.

Header size of the ICMP message is _________

A. 8-bytes
B. 8-bits
C. 16-bytes
D. 16-bits
Answer» B. 8-bits
39.

A subset of a network that includes all the routers but contains no loopsiscalled:

A. spanning tree
B. spider structure
C. spider tree
D. none of the mentioned
Answer» B. spider structure
40.

Consider different activities related to email.m1:Send an email from a mail client to mail server m2:Download an email from mailbox server to a mail client m3:Checking email in a web browser Which is the applicable level protocol user in each activity?

A. m1:HTTP, m2:SMTP, m3:POP
B. m1:SMTP, m2:FTP, m3:HTTP
C. m1:SMTP, m2:POP, m3:HTTP
D. m1:POP, m2:SMTP, m3:IMAP
Answer» D. m1:POP, m2:SMTP, m3:IMAP
41.

An RTP session is established for ____________

A. each media stream
B. all media streams
C. some predefined number of media streams
D. no media stream
Answer» B. all media streams
42.

AJAX stands for _______

A. asynchronous javascript and xml
B. advanced jsp and xml
C. asynchronous jsp and xml
D. advanced javascript and xml
Answer» B. advanced jsp and xml
43.

Datagrams are routed to their destinations with the help of ________

A. switch table
B. segments table
C. datagram table
D. routing table
Answer» D. routing table
44.

A is a device that forwards packets between networks by processing the routing information included in the packet.

A. Bridge
B. Firewall
C. Router
D. Hub
Answer» D. Hub
45.

Pure ALOHA has a maximum throughput of -----------

A. 16.4 %
B. 18.4 %
C. 7.4 %
D. 1 %
Answer» C. 7.4 %
46.

Find the FTP reply whose message is wrongly matched.

A. 331 – username ok, password required
B. 425 – can’t open data connection
C. 452 – error writing file
D. 452 – can’t open data connection
Answer» E.
47.

Bluetooth is the wireless technology for __________

A. local area network
B. personal area network
C. metropolitan area network
D. wide area network
Answer» C. metropolitan area network
48.

Physical layer provides:

A. mechanical specifications of electrical connectors and cables
B. electrical specification of transmission line signal level
C. specification for IR over optical fiber
D. all of the mentioned
Answer» E.
49.

Network congestion occurs _________

A. in case of traffic overloading
B. when a system terminates
C. when connection between two nodes terminates
D. in case of transfer failure
Answer» B. when a system terminates
50.

In a piconet, one master device ________

A. can not be slave
B. can be slave in another piconet
C. can be slave in the same piconet
D. can be master in another piconet
Answer» C. can be slave in the same piconet