

MCQOPTIONS
Saved Bookmarks
This section includes 474 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which one of the below is not an component of Internet mail system |
A. | user agent |
B. | smtp sender |
C. | smtp receiver |
D. | transfer agent |
Answer» E. | |
2. |
A standard mechanism provided by internet which helps in copying a file from one host to another is known as ________. |
A. | smtp |
B. | dns server |
C. | telnet |
D. | ftp |
Answer» E. | |
3. |
The data bit to be transmitted are broken into discrete __________ at the data link layer. |
A. | frame |
B. | stuff |
C. | character |
D. | data |
Answer» B. stuff | |
4. |
A field in header is used to specify the number of characters in the frame. |
A. | start bit |
B. | character count |
C. | end bit |
D. | character stuffing |
Answer» C. end bit | |
5. |
Which of the following are not duties of Physical layer |
A. | bit rate control |
B. | multiplexing |
C. | error detection |
D. | circuit switching |
Answer» D. circuit switching | |
6. |
Below layers are not present in TCP/IP layer. |
A. | application |
B. | presentation |
C. | transport |
D. | network |
Answer» C. transport | |
7. |
Presentation doesn’t perform ________ function |
A. | translation |
B. | transmission |
C. | encryption |
D. | compression |
Answer» C. encryption | |
8. |
____________ media is a communication medium which allows the data to get guided along it. |
A. | transparent |
B. | cable |
C. | guided |
D. | glass |
Answer» D. glass | |
9. |
which of the following is not Guided transmission media |
A. | twisted pair cables |
B. | co-axial cables |
C. | infrared |
D. | fibre optics |
Answer» D. fibre optics | |
10. |
The operation of ____________ is based on signals which are multiplexed and added in time domain butthey occupy different slots in frequency domain |
A. | fdm |
B. | tdm |
C. | wdm |
D. | mdm |
Answer» B. tdm | |
11. |
The ____ field determines the lifetime of IPv6 datagram |
A. | hop limit |
B. | ttl |
C. | next header |
D. | none of the mentioned |
Answer» B. ttl | |
12. |
IPv6 doesnot use ______ type of address |
A. | broadcast |
B. | multicast |
C. | anycast |
D. | none of the mentioned |
Answer» B. multicast | |
13. |
The header length of an IPv6 datagram is _____. |
A. | 10bytes |
B. | 25bytes |
C. | 30bytes |
D. | 40bytes |
Answer» E. | |
14. |
If the value in protocol field is 17, the transport layer protocol used is ____. |
A. | tcp |
B. | udp |
C. | either of the mentioned |
D. | none of the mentioned |
Answer» C. either of the mentioned | |
15. |
The HTTP response message leaves out the requested object when _____ method is used |
A. | get |
B. | post |
C. | head |
D. | put |
Answer» D. put | |
16. |
The values GET, POST, HEAD etc are specified in ____ of HTTP message |
A. | request line |
B. | header line |
C. | status line |
D. | entity body |
Answer» B. header line | |
17. |
The first line of HTTP request message is called ____ |
A. | request line |
B. | header line |
C. | status line |
D. | entity line |
Answer» B. header line | |
18. |
The password is sent to the server using _____ command |
A. | passwd |
B. | pass |
C. | password |
D. | none of the mentioned |
Answer» C. password | |
19. |
The commands, from client to server, and replies, from server to client, are sent across the control connection in ____ bit ASCII format |
A. | 8 |
B. | 7 |
C. | 3 |
D. | 5 |
Answer» C. 3 | |
20. |
FTP uses _____ parallel TCP connections to transfer a file |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» C. 3 | |
21. |
_____ command is used to manipulate TCP/IP routing table. |
A. | route |
B. | ipconfig |
C. | ifconfig |
D. | traceroute |
Answer» B. ipconfig | |
22. |
An RTP header has a minimum size of |
A. | 12 bytes |
B. | 16 bytes |
C. | 24 bytes |
D. | 32 bytes |
Answer» B. 16 bytes | |
23. |
RTP provides the facility of jitter ____ . |
A. | compensation |
B. | expansion |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» B. expansion | |
24. |
The sharing of a medium and its link by two or more devices is called _______ |
A. | fully duplexing |
B. | multiplexing |
C. | both a and b |
D. | none of the mentioned |
Answer» C. both a and b | |
25. |
Transport layer protocols deals with |
A. | application to application communication |
B. | process to process communication |
C. | node to node communication |
D. | none of the mentioned |
Answer» C. node to node communication | |
26. |
The data link layer takes the packets from _____ and encapsulates them into frames for transmission. |
A. | network layer |
B. | physical layer |
C. | transport layer |
D. | application layer |
Answer» B. physical layer | |
27. |
The OSI model has ___ layers. |
A. | 4 |
B. | 5 |
C. | 6 |
D. | 7 |
Answer» E. | |
28. |
Transport layer of OSI model lies between Network and ___________ layer |
A. | Application |
B. | Data link |
C. | Session |
D. | Presentation |
Answer» D. Presentation | |
29. |
The ______ field is used to detect errors over the entire user datagram. |
A. | udp header |
B. | checksum |
C. | source port |
D. | destination port |
Answer» C. source port | |
30. |
VPNs are financially speaking __________ |
A. | always more expensive than leased lines |
B. | always cheaper than leased lines |
C. | usually cheaper than leased lines |
D. | usually more expensive than leased lines |
Answer» D. usually more expensive than leased lines | |
31. |
URL stands for ________ |
A. | unique reference label |
B. | uniform reference label |
C. | uniform resource locator |
D. | unique resource locator |
Answer» D. unique resource locator | |
32. |
In RPC, while a server is processing the call, the client is blocked ________ |
A. | unless the client sends an asynchronous request to the server |
B. | unless the call processing is complete |
C. | for the complete duration of the connection |
D. | unless the server is disconnected |
Answer» B. unless the call processing is complete | |
33. |
Bluetooth uses __________ |
A. | frequency hopping spread spectrum |
B. | orthogonal frequency division multiplexing |
C. | time division multiplexing |
D. | channel division multiplexing |
Answer» B. orthogonal frequency division multiplexing | |
34. |
SMTP defines _______ |
A. | message transport |
B. | message encryption |
C. | message content |
D. | message password |
Answer» B. message encryption | |
35. |
Automatic protection switching in linear network is defined at the _______ |
A. | line layer |
B. | section layer |
C. | photonic layer |
D. | path layer |
Answer» B. section layer | |
36. |
A modulator converts a signal to a(n) signal. |
A. | FSK; PSK |
B. | PSK; FSK |
C. | analog; digital |
D. | digital; analog |
Answer» D. digital; analog | |
37. |
If a file consisting of 50,000 characters takes 40 seconds to send, then thedata rate is __________. |
A. | 1 kbps |
B. | 1.25 kbps |
C. | 2 kbps |
D. | 10 kbps |
Answer» E. | |
38. |
Header size of the ICMP message is _________ |
A. | 8-bytes |
B. | 8-bits |
C. | 16-bytes |
D. | 16-bits |
Answer» B. 8-bits | |
39. |
A subset of a network that includes all the routers but contains no loopsiscalled: |
A. | spanning tree |
B. | spider structure |
C. | spider tree |
D. | none of the mentioned |
Answer» B. spider structure | |
40. |
Consider different activities related to email.m1:Send an email from a mail client to mail server m2:Download an email from mailbox server to a mail client m3:Checking email in a web browser Which is the applicable level protocol user in each activity? |
A. | m1:HTTP, m2:SMTP, m3:POP |
B. | m1:SMTP, m2:FTP, m3:HTTP |
C. | m1:SMTP, m2:POP, m3:HTTP |
D. | m1:POP, m2:SMTP, m3:IMAP |
Answer» D. m1:POP, m2:SMTP, m3:IMAP | |
41. |
An RTP session is established for ____________ |
A. | each media stream |
B. | all media streams |
C. | some predefined number of media streams |
D. | no media stream |
Answer» B. all media streams | |
42. |
AJAX stands for _______ |
A. | asynchronous javascript and xml |
B. | advanced jsp and xml |
C. | asynchronous jsp and xml |
D. | advanced javascript and xml |
Answer» B. advanced jsp and xml | |
43. |
Datagrams are routed to their destinations with the help of ________ |
A. | switch table |
B. | segments table |
C. | datagram table |
D. | routing table |
Answer» D. routing table | |
44. |
A is a device that forwards packets between networks by processing the routing information included in the packet. |
A. | Bridge |
B. | Firewall |
C. | Router |
D. | Hub |
Answer» D. Hub | |
45. |
Pure ALOHA has a maximum throughput of ----------- |
A. | 16.4 % |
B. | 18.4 % |
C. | 7.4 % |
D. | 1 % |
Answer» C. 7.4 % | |
46. |
Find the FTP reply whose message is wrongly matched. |
A. | 331 – username ok, password required |
B. | 425 – can’t open data connection |
C. | 452 – error writing file |
D. | 452 – can’t open data connection |
Answer» E. | |
47. |
Bluetooth is the wireless technology for __________ |
A. | local area network |
B. | personal area network |
C. | metropolitan area network |
D. | wide area network |
Answer» C. metropolitan area network | |
48. |
Physical layer provides: |
A. | mechanical specifications of electrical connectors and cables |
B. | electrical specification of transmission line signal level |
C. | specification for IR over optical fiber |
D. | all of the mentioned |
Answer» E. | |
49. |
Network congestion occurs _________ |
A. | in case of traffic overloading |
B. | when a system terminates |
C. | when connection between two nodes terminates |
D. | in case of transfer failure |
Answer» B. when a system terminates | |
50. |
In a piconet, one master device ________ |
A. | can not be slave |
B. | can be slave in another piconet |
C. | can be slave in the same piconet |
D. | can be master in another piconet |
Answer» C. can be slave in the same piconet | |