Explore topic-wise MCQs in Computer Science.

This section includes 474 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.

51.

ATM can be used for ________

A. local area network
B. wide area network
C. campus area network
D. networks covering any range
Answer» E.
52.

NAT stands for _____ .

A. network address transformer
B. network address translator
C. network address translation
D. Both B and C above
Answer» D. Both B and C above
53.

If we want that a character be interpreted by the client instead of server _________

A. interpret as command (iac) escape character has to be used
B. control functions has to be disabled
C. it is not possible
D. cli character has to be used
Answer» B. control functions has to be disabled
54.

A is a TCP name for a transport service access point.

A. port
B. pipe
C. node
D. none of the mentioned
Answer» B. pipe
55.

If 5 files are transferred from server A to client B in the same session. The number of TCP connection between A and B is:

A. 5
B. 10
C. 2
D. 6
Answer» E.
56.

ISP exchanges internet traffic between their networks by __________

A. internet exchange point
B. subscriber end point
C. isp end point
D. internet end point
Answer» B. subscriber end point
57.

What will be the efficiency of a Stop and Wait protocol, if the transmissiontime for a frame is 20ns and the propagation time is 30ns?

A. 20%
B. 25%
C. 40%
D. 66%
Answer» C. 40%
58.

Which of the following are transport layer protocols used in networking?

A. tcp and ftp
B. udp and http
C. tcp and udp
D. http and ftp
Answer» D. http and ftp
59.

EIGRP sends a hello message after every ___________ seconds.

A. 5 seconds (lan), 60 seconds (wan)
B. 5 seconds (lan), 5 seconds (wan)
C. 15s
D. 180s
Answer» B. 5 seconds (lan), 5 seconds (wan)
60.

For default gateway, which of following commands will you use on a Cisco router?

A. ip default network
B. ip default gateway
C. ip default route
D. default network
Answer» B. ip default gateway
61.

User datagram protocol is called connectionless because _____________

A. all udp packets are treated independently by transport layer
B. it sends data as a stream of related packets
C. it is received in the same order as sent order
D. it sends data very quickly
Answer» B. it sends data as a stream of related packets
62.

Why IP Protocol is considered as unreliable?

A. A packet may be lost
B. Packets may arrive out of order
C. Duplicate packets may be generated
D. All of the above
Answer» E.
63.

Frame relay provides error detection at the ______

A. physical layer
B. data link layer
C. network layer
D. transport layer
Answer» C. network layer
64.

An RPC application requires _________

A. specific protocol for client server communication
B. a client program
C. a server program
D. all of the mentioned
Answer» E.
65.

HFC contains _______

A. fibre cable
B. coaxial cable
C. a combination of fibre cable and coaxial cable
D. twisted pair cable
Answer» D. twisted pair cable
66.

Retransmission of packets must not be done when _______

A. packet is lost
B. packet is corrupted
C. packet is needed
D. packet is error-free
Answer» E.
67.

The time required to examine the packet’s header and determine where to direct the packetis part of

A. Processing delay
B. Queuing delay
C. Transmission delay
D. Propagation delay
Answer» B. Queuing delay
68.

If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of circuit this TDM is

A. 32kbps
B. 500bps
C. 500kbps
D. 32bps
Answer» B. 500bps
69.

An IP address contains________ bits ?

A. 8
B. 16
C. 32
D. 64
Answer» D. 64
70.

For encryption, WiMAX supports _______

A. advanced encryption standard
B. triple data encryption standard
C. advanced encryption standard and triple data encryption standard
D. double data encryption standard
Answer» D. double data encryption standard
71.

The 802.5 standard implements a way for preventing collisions on thenetwork. How are collisions prevented when using this standard?

A. CSMA/CD
B. Token passing
C. Collision detection
D. Time sharing
Answer» C. Collision detection
72.

Which of the following frequencies is not used in WiMAX for communication?

A. 2.3 ghz
B. 2.4 ghz
C. 2.5 ghz
D. 3.5 ghz
Answer» C. 2.5 ghz
73.

Propagation delay depends on ___________

A. packet length
B. transmission rate
C. distance between the routers
D. speed of the cpu
Answer» D. speed of the cpu
74.

The combination of an IP address and port number is called as ________

A. socket address
B. port address
C. mac address
D. host address
Answer» B. port address
75.

Which one of the followings is a connectionless protocol?

A. UDP
B. Ethernet
C. IPX
D. All of the above
Answer» E.
76.

A network management system can be divided into ___________

A. three categories
B. five broad categories
C. seven broad categories
D. ten broad categories
Answer» C. seven broad categories
77.

The number of layers in ISO OSI reference model is

A. 5
B. 7
C. 6
D. 10
Answer» C. 6
78.

DSL stands for ------------------------

A. data subscriber lines
B. dual subscriber lines
C. delay subscriber lines
D. digital subscriber lines
Answer» E.
79.

SMTP connections secured by SSL are known as _____________

A. smtps
B. ssmtp
C. snmp
D. starttls
Answer» B. ssmtp
80.

The main reason for transition from IPv4 to IPv6 is _________

A. huge number of systems on the internet
B. very low number of system on the internet
C. providing standard address
D. to provide faster internet
Answer» B. very low number of system on the internet
81.

A single channel is shared by multiple signals by ____________

A. analog modulation
B. digital modulation
C. multiplexing
D. phase modulation
Answer» D. phase modulation
82.

LSP stands for __________

A. link stable packet
B. link state packet
C. link state protocol
D. link state path
Answer» C. link state protocol
83.

Which multiplexing technique used to transmit digital signals?

A. fdm
B. tdm
C. wdm
D. fdm & wdm
Answer» C. wdm
84.

Steps required in setup process are ___________

A. setup request and acknowledgement
B. setup request and setup response
C. setup request and setup termination
D. setup and termination steps
Answer» B. setup request and setup response
85.

Which of the following device is used to connect two systems, especiallyifthe systems use different protocols?

A. hub
B. bridge
C. gateway
D. repeater
Answer» D. repeater
86.

RPF stands for __________

A. reverse path forwarding
B. reverse path failure
C. reverse packet forwarding
D. reverse protocol failure
Answer» B. reverse path failure
87.

In computer network nodes are _________

A. the computer that originates the data
B. the computer that routes the data
C. the computer that terminates the data
D. all of the mentioned
Answer» E.
88.

Ethernet frame consists of ____________

A. mac address
B. ip address
C. default mask
D. network address
Answer» B. ip address
89.

What is the max data transfer rate for optical fiber cable?

A. 10 mbps
B. 100 mbps
C. 1000 mbps
D. 10000 mbps
Answer» E.
90.

The port number is “ephemeral port number”, if the source host is _______

A. ntp
B. echo
C. server
D. client
Answer» E.
91.

In serial data transmission, every byte of data is padded with a ‘0’ in thebeginning and one or two ‘1’ s at the end of byte because

A. Receiver is to be synchronized for byte reception
B. Receiver recovers lost ‘0’ and ‘1’s from these padded bits
C. Padded bits are useful in parity computation
D. None of these
Answer» B. Receiver recovers lost ‘0’ and ‘1’s from these padded bits
92.

Packets in datagram switching are referred to as ________

A. switches
B. segments
C. datagrams
D. data-packets
Answer» D. data-packets
93.

Which of the following factors affect transmission rate in DSL?

A. the gauge of the twisted-pair line
B. degree of electrical interfernece
C. shadow fading
D. the gauge of the twisted-pair line and degree of electrical interference
Answer» E.
94.

A family of network control protocols (NCPs) ____________

A. are a series of independently defined protocols that provide a dynamic
B. are a series of independently-defined protocols that encapsulate
C. are a series of independently defined protocols that provide transparent
D. the same as nfs
Answer» C. are a series of independently defined protocols that provide transparent
95.

What are the uses of subnetting ?

A. It divides one large network into several smaller ones
B. It divides network into network classes
C. It speeds up the speed of network
D. None of above
Answer» B. It divides network into network classes
96.

A network point that provides entrance into another network is called as ___________

A. Node
B. Gateway
C. Switch
D. Router
Answer» C. Switch
97.

What is the size of Host bits in Class B of IP address?

A. 04
B. 08
C. 16
D. 32
Answer» D. 32
98.

Which of the following protocol below are suited for email retrieval?

A. POP3
B. IMAP
C. FTP
D. Both and b above
Answer» E.
99.

Which routing protocol below is used by exterior routers between the autonomous systems?

A. RIP
B. IGRP
C. OSPF
D. BGP
Answer» E.
100.

Transport layer of OSI model lies between Network and layer

A. Application
B. Data link
C. Session
D. Presentation
Answer» D. Presentation