Explore topic-wise MCQs in Computer Science.

This section includes 474 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.

151.

In TCP, sending and receiving data is done as _______

A. stream of bytes
B. sequence of characters
C. lines of data
D. packets
Answer» B. sequence of characters
152.

A unidirectional path switching ring is a network with __________

A. one ring
B. two rings
C. three rings
D. four rings
Answer» C. three rings
153.

In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ________.

A. 2 bytes
B. 1 bytes
C. 4 bytes
D. 5 bytes
Answer» E.
154.

The translates internet domain and host names to IP address.

A. domain name system
B. routing information protocol
C. network time protocol
D. internet relay chat
Answer» B. routing information protocol
155.

A Link Control Protocol (LCP) is used for ____________

A. establishing, configuring and testing the data-link connection
B. establishing and configuring different network-layer protocols
C. testing the different network-layer protocols
D. provides for multiplexing of different network-layer protocols
Answer» B. establishing and configuring different network-layer protocols
156.

Which piece of information is not vital for a computer in a TCP/IP network?

A. IP address
B. Default gateway
C. Subnet Mask
D. DNS server
Answer» E.
157.

WiMAX is mostly used for __________

A. local area network
B. metropolitan area network
C. personal area network
D. wide area network
Answer» C. personal area network
158.

A remote procedure is uniquely identified by _________

A. program number
B. version number
C. procedure number
D. all of the mentioned
Answer» E.
159.

In Inet Address class, which method returns the host name of the IP Address?

A. public string get hostname()
B. public string gethostaddress()
C. public static inetaddress get localhost()
D. public getbyname()
Answer» B. public string gethostaddress()
160.

In data transfer phase, how many columns does the table contain?

A. 1
B. 2
C. 3
D. 4
Answer» E.
161.

A wireless network interface controller can work in _______

A. infrastructure mode
B. ad-hoc mode
C. both infrastructure mode and ad-hoc mode
D. wds mode
Answer» D. wds mode
162.

Bluetooth supports _______

A. point-to-point connections
B. point-to-multipoint connection
C. both point-to-point connections and point-to-multipoint connection
D. multipoint to point connection
Answer» D. multipoint to point connection
163.

RTP can use __________

A. unprevileleged udp ports
B. stream control transmission protocol
C. datagram congestion control protocol
D. all of the mentioned
Answer» E.
164.

A small network making up the Internet and also having a small numbers of computers within it is called

A. Host
B. Address
C. Subdomain
D. None of the above
Answer» D. None of the above
165.

In asynchronous serial communication the physical layer provides ___________

A. start and stop signalling
B. flow control
C. both start & stop signalling and flow control
D. only start signalling
Answer» D. only start signalling
166.

Automatic repeat request error management mechanism is provided by ________

A. logical link control sublayer
B. media access control sublayer
C. network interface control sublayer
D. application access control sublayer
Answer» B. media access control sublayer
167.

Baud rate is:

A. number of signal changes per second
B. number of bits per second
C. number of bytes per second
D. number of ASCII characters per second
Answer» B. number of bits per second
168.

__________ is a standard suite of protocols used for packet switching across computer networks.

A. x.22
B. x.23
C. x.25
D. x.26
Answer» D. x.26
169.

The functionalities of the presentation layer include ____________

A. data compression
B. data encryption
C. data description
D. all of the mentioned
Answer» E.
170.

An SMTP session may not include _______

A. zero smtp transaction
B. one smtp transaction
C. more than one smtp transaction
D. one http transaction
Answer» E.
171.

Transport layer is implemented in ______________

A. end system
B. nic
C. ethernet
D. signal transmission
Answer» B. nic
172.

Which layer is used to link the network support layers and user support layers?

A. session layer
B. data link layer
C. transport layer
D. network layer
Answer» D. network layer
173.

Frame relay has _______

A. only physical layer
B. only data link layer
C. only network layer
D. both physical and data link layer
Answer» E.
174.

993. Determine the maximum length of the cable (in km) for transmitting data at a rate of 500 Mbps in an Ethernet LAN with frames of size 10,000 bits. Assume the signal speed in the cable to be 2,00,000 km/s.

A. 1
B. 2
C. 2.5
D. 5
Answer» C. 2.5
175.

The PSTN is an example of a ………………… network.

A. packet switched
B. circuit switched
C. message switched
D. None of these
Answer» C. message switched
176.

Which of the following is true of signature-based IDSes?

A. they alert administrators to deviations from “normal” traffic behavior
B. they identify previously unknown attacks
C. the technology is mature and reliable enough to use on production networks
D. they scan network traffic or packets to identify matches with attack-definition files
Answer» E.
177.

Telnet is used for _______

A. television on net
B. network of telephones
C. remote login
D. teleshopping site
Answer» D. teleshopping site
178.

can detect burst error of length less than or equal to degree of thepolynomial and detects burst errors that affect odd number of bits.

A. Hamming Code
B. CRC
C. VRC
D. None of the above
Answer» C. VRC
179.

Bits can be sent over guided and unguided media as analog signal by ___________

A. digital modulation
B. amplitude modulation
C. frequency modulation
D. phase modulation
Answer» B. amplitude modulation
180.

A set of rules that governs data communication.

A. Protocols
B. Standards
C. RFCs
D. Servers
Answer» B. Standards
181.

Socket-style API for windows is called ____________

A. wsock
B. winsock
C. wins
D. sockwi
Answer» C. wins
182.

FTP server listens for connection on port number ____________

A. 20
B. 21
C. 22
D. 23
Answer» C. 22
183.

Header of a frame generally contains ______________

A. synchronization bytes
B. addresses
C. frame identifier
D. all of the mentioned
Answer» E.
184.

Frame Relay networks offer an option called _______

A. voice over for relay
B. voice over fine relay
C. voice on frame relay
D. voice over frame relay
Answer» E.
185.

First address in a block is used as network address that represents the ________

A. class network
B. entity
C. organization
D. codes
Answer» D. codes
186.

What is the Demilitarized Zone?

A. The area between firewall & connection to an external network
B. The area between ISP to Military area
C. The area surrounded by secured servers
D. The area surrounded by the Military
Answer» B. The area between ISP to Military area
187.

OSI standsfor

A. Open system interconnection
B. Operating system interface
C. Optical service implementation
D. Open service Internet
Answer» B. Operating system interface
188.

In File Transfer Protocol, data transfer cannot be done in ___________

A. stream mode
B. block mode
C. compressed mode
D. message mode
Answer» E.
189.

In serial data transmission, every byte of data is padded with a ‘0’ in the beginning and one or two ‘1’ s at the end of byte because

A. Receiver is to be synchronized for byte reception
B. Receiver recovers lost ‘0’ and ‘1’s from these padded bits
C. Padded bits are useful in parity computation
D. None of these
Answer» B. Receiver recovers lost ‘0’ and ‘1’s from these padded bits
190.

In _________ systems, resources are allocated on demand.

A. packet switching
B. circuit switching
C. line switching
D. frequency switching
Answer» B. circuit switching
191.

TELNET used _________ protocol for data connection

A. TCP
B. UDP
C. IP
D. DHCP
Answer» B. UDP
192.

Wireless transmission of signals can be done via ___________

A. radio waves
B. microwaves
C. infrared
D. all of the mentioned
Answer» E.
193.

An ATM cell has the payload field of __________

A. 32 bytes
B. 48 bytes
C. 64 bytes
D. 128 bytes
Answer» C. 64 bytes
194.

Which one of the following routing algorithm can be used for network layerdesign?

A. shortest path algorithm
B. distance vector routing
C. link state routing
D. all of the mentioned
Answer» E.
195.

Match the following:(P) SMTP (1) Application layer(Q) BGP (2) Transport layer(R) TCP (3) Data link layer(S) PPP (4) Network layer(5) Physical layer

A. P – 2 Q – 1 R – 3 S – 5
B. P – 1 Q – 4 R – 2 S – 3
C. P – 1 Q – 4 R – 2 S – 5
D. P – 2 Q – 4 R – 1 S – 3
Answer» C. P – 1 Q – 4 R – 2 S – 5
196.

MAC address is of ___________

A. 24 bits
B. 36 bits
C. 42 bits
D. 48 bits
Answer» E.
197.

SNMP is the framework for managing devices in an internet using the ______

A. tcp/ip protocol
B. udp
C. smtp
D. none
Answer» B. udp
198.

_____________ allows LAN users to share computer programs and data.

A. communication server
B. print server
C. file server
D. network
Answer» D. network
199.

A link local address of local addresses is used in an _______

A. isolated router
B. isolated mask
C. isolated subnet
D. isolated net
Answer» D. isolated net
200.

An IP address contains bits ?

A. 8
B. 16
C. 32
D. 64
Answer» D. 64