

MCQOPTIONS
Saved Bookmarks
This section includes 474 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
151. |
In TCP, sending and receiving data is done as _______ |
A. | stream of bytes |
B. | sequence of characters |
C. | lines of data |
D. | packets |
Answer» B. sequence of characters | |
152. |
A unidirectional path switching ring is a network with __________ |
A. | one ring |
B. | two rings |
C. | three rings |
D. | four rings |
Answer» C. three rings | |
153. |
In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ________. |
A. | 2 bytes |
B. | 1 bytes |
C. | 4 bytes |
D. | 5 bytes |
Answer» E. | |
154. |
The translates internet domain and host names to IP address. |
A. | domain name system |
B. | routing information protocol |
C. | network time protocol |
D. | internet relay chat |
Answer» B. routing information protocol | |
155. |
A Link Control Protocol (LCP) is used for ____________ |
A. | establishing, configuring and testing the data-link connection |
B. | establishing and configuring different network-layer protocols |
C. | testing the different network-layer protocols |
D. | provides for multiplexing of different network-layer protocols |
Answer» B. establishing and configuring different network-layer protocols | |
156. |
Which piece of information is not vital for a computer in a TCP/IP network? |
A. | IP address |
B. | Default gateway |
C. | Subnet Mask |
D. | DNS server |
Answer» E. | |
157. |
WiMAX is mostly used for __________ |
A. | local area network |
B. | metropolitan area network |
C. | personal area network |
D. | wide area network |
Answer» C. personal area network | |
158. |
A remote procedure is uniquely identified by _________ |
A. | program number |
B. | version number |
C. | procedure number |
D. | all of the mentioned |
Answer» E. | |
159. |
In Inet Address class, which method returns the host name of the IP Address? |
A. | public string get hostname() |
B. | public string gethostaddress() |
C. | public static inetaddress get localhost() |
D. | public getbyname() |
Answer» B. public string gethostaddress() | |
160. |
In data transfer phase, how many columns does the table contain? |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» E. | |
161. |
A wireless network interface controller can work in _______ |
A. | infrastructure mode |
B. | ad-hoc mode |
C. | both infrastructure mode and ad-hoc mode |
D. | wds mode |
Answer» D. wds mode | |
162. |
Bluetooth supports _______ |
A. | point-to-point connections |
B. | point-to-multipoint connection |
C. | both point-to-point connections and point-to-multipoint connection |
D. | multipoint to point connection |
Answer» D. multipoint to point connection | |
163. |
RTP can use __________ |
A. | unprevileleged udp ports |
B. | stream control transmission protocol |
C. | datagram congestion control protocol |
D. | all of the mentioned |
Answer» E. | |
164. |
A small network making up the Internet and also having a small numbers of computers within it is called |
A. | Host |
B. | Address |
C. | Subdomain |
D. | None of the above |
Answer» D. None of the above | |
165. |
In asynchronous serial communication the physical layer provides ___________ |
A. | start and stop signalling |
B. | flow control |
C. | both start & stop signalling and flow control |
D. | only start signalling |
Answer» D. only start signalling | |
166. |
Automatic repeat request error management mechanism is provided by ________ |
A. | logical link control sublayer |
B. | media access control sublayer |
C. | network interface control sublayer |
D. | application access control sublayer |
Answer» B. media access control sublayer | |
167. |
Baud rate is: |
A. | number of signal changes per second |
B. | number of bits per second |
C. | number of bytes per second |
D. | number of ASCII characters per second |
Answer» B. number of bits per second | |
168. |
__________ is a standard suite of protocols used for packet switching across computer networks. |
A. | x.22 |
B. | x.23 |
C. | x.25 |
D. | x.26 |
Answer» D. x.26 | |
169. |
The functionalities of the presentation layer include ____________ |
A. | data compression |
B. | data encryption |
C. | data description |
D. | all of the mentioned |
Answer» E. | |
170. |
An SMTP session may not include _______ |
A. | zero smtp transaction |
B. | one smtp transaction |
C. | more than one smtp transaction |
D. | one http transaction |
Answer» E. | |
171. |
Transport layer is implemented in ______________ |
A. | end system |
B. | nic |
C. | ethernet |
D. | signal transmission |
Answer» B. nic | |
172. |
Which layer is used to link the network support layers and user support layers? |
A. | session layer |
B. | data link layer |
C. | transport layer |
D. | network layer |
Answer» D. network layer | |
173. |
Frame relay has _______ |
A. | only physical layer |
B. | only data link layer |
C. | only network layer |
D. | both physical and data link layer |
Answer» E. | |
174. |
993. Determine the maximum length of the cable (in km) for transmitting data at a rate of 500 Mbps in an Ethernet LAN with frames of size 10,000 bits. Assume the signal speed in the cable to be 2,00,000 km/s. |
A. | 1 |
B. | 2 |
C. | 2.5 |
D. | 5 |
Answer» C. 2.5 | |
175. |
The PSTN is an example of a ………………… network. |
A. | packet switched |
B. | circuit switched |
C. | message switched |
D. | None of these |
Answer» C. message switched | |
176. |
Which of the following is true of signature-based IDSes? |
A. | they alert administrators to deviations from “normal” traffic behavior |
B. | they identify previously unknown attacks |
C. | the technology is mature and reliable enough to use on production networks |
D. | they scan network traffic or packets to identify matches with attack-definition files |
Answer» E. | |
177. |
Telnet is used for _______ |
A. | television on net |
B. | network of telephones |
C. | remote login |
D. | teleshopping site |
Answer» D. teleshopping site | |
178. |
can detect burst error of length less than or equal to degree of thepolynomial and detects burst errors that affect odd number of bits. |
A. | Hamming Code |
B. | CRC |
C. | VRC |
D. | None of the above |
Answer» C. VRC | |
179. |
Bits can be sent over guided and unguided media as analog signal by ___________ |
A. | digital modulation |
B. | amplitude modulation |
C. | frequency modulation |
D. | phase modulation |
Answer» B. amplitude modulation | |
180. |
A set of rules that governs data communication. |
A. | Protocols |
B. | Standards |
C. | RFCs |
D. | Servers |
Answer» B. Standards | |
181. |
Socket-style API for windows is called ____________ |
A. | wsock |
B. | winsock |
C. | wins |
D. | sockwi |
Answer» C. wins | |
182. |
FTP server listens for connection on port number ____________ |
A. | 20 |
B. | 21 |
C. | 22 |
D. | 23 |
Answer» C. 22 | |
183. |
Header of a frame generally contains ______________ |
A. | synchronization bytes |
B. | addresses |
C. | frame identifier |
D. | all of the mentioned |
Answer» E. | |
184. |
Frame Relay networks offer an option called _______ |
A. | voice over for relay |
B. | voice over fine relay |
C. | voice on frame relay |
D. | voice over frame relay |
Answer» E. | |
185. |
First address in a block is used as network address that represents the ________ |
A. | class network |
B. | entity |
C. | organization |
D. | codes |
Answer» D. codes | |
186. |
What is the Demilitarized Zone? |
A. | The area between firewall & connection to an external network |
B. | The area between ISP to Military area |
C. | The area surrounded by secured servers |
D. | The area surrounded by the Military |
Answer» B. The area between ISP to Military area | |
187. |
OSI standsfor |
A. | Open system interconnection |
B. | Operating system interface |
C. | Optical service implementation |
D. | Open service Internet |
Answer» B. Operating system interface | |
188. |
In File Transfer Protocol, data transfer cannot be done in ___________ |
A. | stream mode |
B. | block mode |
C. | compressed mode |
D. | message mode |
Answer» E. | |
189. |
In serial data transmission, every byte of data is padded with a ‘0’ in the beginning and one or two ‘1’ s at the end of byte because |
A. | Receiver is to be synchronized for byte reception |
B. | Receiver recovers lost ‘0’ and ‘1’s from these padded bits |
C. | Padded bits are useful in parity computation |
D. | None of these |
Answer» B. Receiver recovers lost ‘0’ and ‘1’s from these padded bits | |
190. |
In _________ systems, resources are allocated on demand. |
A. | packet switching |
B. | circuit switching |
C. | line switching |
D. | frequency switching |
Answer» B. circuit switching | |
191. |
TELNET used _________ protocol for data connection |
A. | TCP |
B. | UDP |
C. | IP |
D. | DHCP |
Answer» B. UDP | |
192. |
Wireless transmission of signals can be done via ___________ |
A. | radio waves |
B. | microwaves |
C. | infrared |
D. | all of the mentioned |
Answer» E. | |
193. |
An ATM cell has the payload field of __________ |
A. | 32 bytes |
B. | 48 bytes |
C. | 64 bytes |
D. | 128 bytes |
Answer» C. 64 bytes | |
194. |
Which one of the following routing algorithm can be used for network layerdesign? |
A. | shortest path algorithm |
B. | distance vector routing |
C. | link state routing |
D. | all of the mentioned |
Answer» E. | |
195. |
Match the following:(P) SMTP (1) Application layer(Q) BGP (2) Transport layer(R) TCP (3) Data link layer(S) PPP (4) Network layer(5) Physical layer |
A. | P – 2 Q – 1 R – 3 S – 5 |
B. | P – 1 Q – 4 R – 2 S – 3 |
C. | P – 1 Q – 4 R – 2 S – 5 |
D. | P – 2 Q – 4 R – 1 S – 3 |
Answer» C. P – 1 Q – 4 R – 2 S – 5 | |
196. |
MAC address is of ___________ |
A. | 24 bits |
B. | 36 bits |
C. | 42 bits |
D. | 48 bits |
Answer» E. | |
197. |
SNMP is the framework for managing devices in an internet using the ______ |
A. | tcp/ip protocol |
B. | udp |
C. | smtp |
D. | none |
Answer» B. udp | |
198. |
_____________ allows LAN users to share computer programs and data. |
A. | communication server |
B. | print server |
C. | file server |
D. | network |
Answer» D. network | |
199. |
A link local address of local addresses is used in an _______ |
A. | isolated router |
B. | isolated mask |
C. | isolated subnet |
D. | isolated net |
Answer» D. isolated net | |
200. |
An IP address contains bits ? |
A. | 8 |
B. | 16 |
C. | 32 |
D. | 64 |
Answer» D. 64 | |