Explore topic-wise MCQs in Computer Science.

This section includes 474 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.

101.

In the OSI model, as a data packet moves from the lower to the upper layers, headers are .

A. added
B. removed
C. rearranged
D. Modified
Answer» C. rearranged
102.

Which of the following modulation schemes is supported by WiMAX?

A. binary phase shift keying modulation
B. quadrature phase shift keying modulation
C. quadrature amplitude modulation
D. all of the mentioned
Answer» E.
103.

How many layers are present in the Internet protocol stack (TCP/IP model)?

A. 5
B. 7
C. 6
D. 10
Answer» B. 7
104.

Where should we use default routing?

A. on stub networks- which have only one exit path out of the network
B. which have more than one exit path out of the network
C. minimum five exit paths out of the network
D. maximum five exit paths out of the network
Answer» B. which have more than one exit path out of the network
105.

A subset of a network that includes all the routers but contains no loops iscalled:

A. spanning tree
B. spider structure
C. spider tree
D. none of the mentioned
Answer» B. spider structure
106.

Message Oriented Middleware allows general purpose messages to be exchanged in a Client/Serversystem using message queues.

A. True
B. False
Answer» B. False
107.

DSL telcos provide which of the following services?

A. wired phone access
B. isp
C. wired phone access and isp
D. network routing and isp
Answer» D. network routing and isp
108.

Piconets in the blue tooth a minimum of two and a maximum of ____________ Bluetooth peerdevices.

A. five
B. eight
C. nine
D. four
Answer» C. nine
109.

In classful addressing, a large part of available addresses are ________

A. organized
B. blocked
C. wasted
D. communicated
Answer» D. communicated
110.

The main difference between SNMPv3 and SNMPv2 is _______

A. management
B. integration
C. classification
D. enhanced security
Answer» E.
111.

WiMAX provides ________

A. simplex communication
B. half duplex communication
C. full duplex communication
D. no communication
Answer» D. no communication
112.

ATM uses _______________

A. asynchronous frequency division multiplexing
B. asynchronous time division multiplexing
C. asynchronous space division multiplexing
D. asynchronous amplitude division multiplexing
Answer» C. asynchronous space division multiplexing
113.

The domain name system is maintained by _______

A. distributed database system
B. a single server
C. a single computer
D. none of the mentioned
Answer» B. a single server
114.

Which of the following is an advantage of anomaly detection?

A. rules are easy to define
B. custom protocols can be easily analyzed
C. the engine can scale as the rule set grows
D. malicious activity that falls within normal usage patterns is detected
Answer» D. malicious activity that falls within normal usage patterns is detected
115.

WAN stands for __________

A. world area network
B. wide area network
C. web area network
D. web access network
Answer» C. web area network
116.

Telnet protocol is used to establish a connection to __________

A. tcp port number 21
B. tcp port number 22
C. tcp port number 23
D. tcp port number 25
Answer» D. tcp port number 25
117.

A network router joins two _________ together?

A. Computers
B. Switches
C. Networks
D. Gateway
Answer» D. Gateway
118.

An RPC (remote procedure call) is initiated by the _________

A. server
B. client
C. client after the sever
D. a third party
Answer» C. client after the sever
119.

A list of protocols used by a system, one protocol per layer, is called ________

A. protocol architecture
B. protocol stack
C. protocol suite
D. protocol system
Answer» C. protocol suite
120.

To use a Simple Network Management System, we need _______

A. servers
B. ip
C. protocols
D. rules
Answer» E.
121.

ICMP is primarily used for __________

A. error and diagnostic functions
B. addressing
C. forwarding
D. routing
Answer» B. addressing
122.

ICMP is primarily used for:

A. error and diagnostic functions
B. addressing
C. forwarding
D. none of the mentioned
Answer» B. addressing
123.

Which Project 802 standard provides for a collision-free protocol?

A. 802.2
B. 802.3
C. 802.5
D. 802.6
Answer» D. 802.6
124.

ALL IP addresses are divided into a network address and host address

A. True
B. False
Answer» B. False
125.

Firewalls are often configured to block ___________

A. udp traffic
B. tcp traffic
C. sensitive traffic
D. best-effort traffic
Answer» B. tcp traffic
126.

ESP does not provide ________

A. source authentication
B. data integrity
C. privacy
D. error control
Answer» E.
127.

The function of DSLAM is to __________

A. convert analog signals into digital signals
B. convert digital signals into analog signals
C. amplify digital signals
D. de-amplify digital signals
Answer» B. convert digital signals into analog signals
128.

What allows TCP to detect lost segments and in turn recover from that loss?

A. sequence number
B. acknowledgment number
C. checksum
D. both sequence & acknowledgment number
Answer» C. checksum
129.

Which of the following below is a loopback IP address?

A. 127.0.0.0
B. 127.0.1.1
C. 127.0.1.0
D. 127.0.0.1
Answer» E.
130.

Range of port numbers in Internet model is __________

A. 0 and 32,765(8-bit)
B. 0 and 32,765(16-bit)
C. 0 and 65,535(32-bit)
D. 0 and 65,535(16-bit)
Answer» E.
131.

Application layer is implemented in ____________

A. end system
B. nic
C. ethernet
D. packet transport
Answer» B. nic
132.

A session may include ________

A. zero or more smtp transactions
B. exactly one smtp transactions
C. always more than one smtp transactions
D. number of smtp transactions cant be determined
Answer» B. exactly one smtp transactions
133.

is the multiplexing technique that shifts each signal to a different carrierfrequency.

A. FDM
B. TDM
C. Both FDM & TDM
D. PDM
Answer» B. TDM
134.

Which of the following below are secure VPN protocols?

A. UDP
B. TCP
C. SSTP
D. Both B and C
Answer» E.
135.

SYNC flooding attack belongs to a type of security attack known as ___________

A. sync flooding attack
B. active attack
C. passive attack
D. denial-of-service attack
Answer» E.
136.

Return value of the UDP port “Chargen” is _______

A. string of characters
B. string of integers
C. array of characters with integers
D. array of zero’s and one’s
Answer» B. string of integers
137.

Which IP address is reserved for software loop-back?

A. 224.x.x.x
B. 127.x.x.x
C. 0.0.0.0
D. 255.255.255.255
Answer» C. 0.0.0.0
138.

The functionalities of the presentation layerinclude

A. Data compression
B. Data encryption
C. Data description
D. All of the mentioned
Answer» E.
139.

An endpoint of an inter-process communication flow across a computer network is called:

A. socket
B. pipe
C. port
D. none of the mentioned
Answer» B. pipe
140.

Which of these is a feature of hubs?

A. Hubs amplifies the incoming signal.
B. Hubs understand frames, packets or headers
C. All lines coming into a Hub must operate at a same speed.
D. all of these
Answer» D. all of these
141.

What are the other types of OLAP apart from ROLAP?

A. HOLAP
B. MOLAP
C. DOLAP
D. Both a and b above
Answer» C. DOLAP
142.

Ping command works on which protocol?

A. ICMP
B. TCP
C. IP
D. UDP
Answer» B. TCP
143.

MAC addresses are also known as?

A. Hardware address
B. Physical address
C. both and b above
D. IP address
Answer» D. IP address
144.

Dual-stack approach refers to _________

A. implementing ipv4 with 2 stacks
B. implementing ipv6 with 2 stacks
C. node has both ipv4 and ipv6 support
D. implementing a mac address with 2 stacks
Answer» D. implementing a mac address with 2 stacks
145.

Which of the following statements can be associated with OSI model?

A. a structured way to discuss and easier update system components
B. one layer may duplicate lower layer functionality
C. functionality at one layer no way requires information from another layer
D. it is an application specific network model
Answer» D. it is an application specific network model
146.

Delimiting and synchronization of data exchange is providedby

A. Application layer
B. Session layer
C. Transport layer
D. Link layer
Answer» C. Transport layer
147.

Communication channel is shared by all the machines on the networkin

A. Broadcast network
B. Unicast network
C. Multicast network
D. Anycast network
Answer» B. Unicast network
148.

Delimiting and synchronization of data exchange is provided by __________

A. application layer
B. session layer
C. transport layer
D. link layer
Answer» C. transport layer
149.

MIB is a collection of groups of objects that can be managed by __________

A. smtp
B. udp
C. snmp
D. tcp/ip
Answer» D. tcp/ip
150.

Which connector does the STP cable use?

A. bnc
B. rj-11
C. rj-45
D. rj-69
Answer» D. rj-69