

MCQOPTIONS
Saved Bookmarks
This section includes 474 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
201. |
Station A needs to send a message consisting of 9 packets to Station B using a sliding window (window size 3) and go-back-n error control strategy. All packets are ready and immediately available for transmission. If every 5th packet that A transmits gets lost (but no acks from B ever get lost), then what isthe number of packets that A will transmit for sending the message to B? |
A. | 12 |
B. | 14 |
C. | 16 |
D. | 18 |
Answer» D. 18 | |
202. |
The communication mode that supports data in both directions at the sametime is |
A. | simplex |
B. | half-duplex |
C. | full-duplex |
D. | multiplex |
Answer» D. multiplex | |
203. |
Which of the following protocols below work in the application layer? |
A. | POP |
B. | PPP |
C. | FTP |
D. | Both a and d above |
Answer» E. | |
204. |
In File Transfer Protocol, data transfer cannot be done in __________ |
A. | stream mode |
B. | block mode |
C. | compressed mode |
D. | message mode |
Answer» E. | |
205. |
If a file consisting of 50,000 characters takes 40 seconds to send, then thedata rate is . |
A. | 1 kbps |
B. | 1.25 kbps |
C. | 2 kbps |
D. | 10 kbps |
Answer» E. | |
206. |
A network router joins two together? |
A. | Computers |
B. | Switches |
C. | Networks |
D. | Gateway |
Answer» D. Gateway | |
207. |
Which among the following features is present in IPv6 but not in IPv4? |
A. | fragmentation |
B. | header checksum |
C. | options |
D. | anycast address |
Answer» E. | |
208. |
Which of the following below is a loopback IPaddress? |
A. | 127.0.0.0 |
B. | 127.0.1.1 |
C. | 127.0.1.0 |
D. | 127.0.0.1 |
Answer» E. | |
209. |
Which multicast address does the OSPF Hello protocol use? |
A. | 224.0.0.5 |
B. | 224.0.0.6 |
C. | 224.0.0.7 |
D. | 224.0.0.8 |
Answer» B. 224.0.0.6 | |
210. |
A linear SONET network can be ________ |
A. | point-to-point |
B. | multi-point |
C. | both point-to-point and multi-point |
D. | single point |
Answer» D. single point | |
211. |
TCP, FTP, Telnet, SMTP, POP etc. are examples of ___________ |
A. | socket |
B. | ip address |
C. | protocol |
D. | mac address |
Answer» D. mac address | |
212. |
In SONET, each synchronous transfer signal STS-n is composed of __________ |
A. | 2000 frames |
B. | 4000 frames |
C. | 8000 frames |
D. | 16000 frames |
Answer» D. 16000 frames | |
213. |
Which of the following HTTP methods should be idempotent in nature? |
A. | options |
B. | delete |
C. | post |
D. | head |
Answer» C. post | |
214. |
Sniffers can be prevented by using _______________ |
A. | wired environment |
B. | wifi |
C. | ethernet lan |
D. | switched network |
Answer» E. | |
215. |
Delay of the resource allocated on demand during data transfer is ________ |
A. | constant |
B. | increases for each packet |
C. | same for each packet |
D. | different for each packet |
Answer» E. | |
216. |
In wireless ad-hoc network _________ |
A. | access point is not required |
B. | access point is must |
C. | nodes are not required |
D. | all nodes are access points |
Answer» B. access point is must | |
217. |
When displaying a web page, the application layer uses the _____________ |
A. | http protocol |
B. | ftp protocol |
C. | smtp protocol |
D. | tcp protocol |
Answer» B. ftp protocol | |
218. |
Which of the IP headers decides when the packet should be discarded? |
A. | Fragment control |
B. | TTL |
C. | Checksum |
D. | Header length |
Answer» C. Checksum | |
219. |
Your company has a LAN in its downtown office and has now set up aLAN in the manufacturing plant in the suburbs. To enable everyone to share data and resources between the two LANs, what type of device(s) are needed to connect them? Choose the most correct answer. |
A. | Modem |
B. | Cable |
C. | Hub |
D. | Router |
Answer» E. | |
220. |
NAT stands for . |
A. | network address transformer |
B. | network address translator |
C. | network address translation |
D. | Both B and C above |
Answer» D. Both B and C above | |
221. |
Multiplexing provides _________ |
A. | efficiency |
B. | privacy |
C. | anti jamming |
D. | both efficiency & privacy |
Answer» E. | |
222. |
Transmission data rate is decided by ____________ |
A. | network layer |
B. | physical layer |
C. | data link layer |
D. | transport layer |
Answer» C. data link layer | |
223. |
Network layer firewall has two sub-categories as _________ |
A. | state full firewall and stateless firewall |
B. | bit oriented firewall and byte oriented firewall |
C. | frame firewall and packet firewall |
D. | network layer firewall and session layer firewall |
Answer» B. bit oriented firewall and byte oriented firewall | |
224. |
If 5 files are transferred from server A to client B in the same session. Thenumber of TCP connection between A and B is: |
A. | 5 |
B. | 10 |
C. | 2 |
D. | 6 |
Answer» E. | |
225. |
_______ topology requires a multipoint connection. |
A. | star |
B. | mesh |
C. | ring |
D. | bus |
Answer» E. | |
226. |
The performance of a data communication network depends on |
A. | The number of users |
B. | The transmission media |
C. | The hardware and software |
D. | All of the above |
Answer» E. | |
227. |
Full duplex mode increases the capacity of each domain by ________ |
A. | 10 to 20 mbps |
B. | 20 to 30 mbps |
C. | 30 to 40 mbps |
D. | 40 to 50 mbps |
Answer» B. 20 to 30 mbps | |
228. |
Which of the following device is used to connect two systems, especially ifthe systems use different protocols? |
A. | hub |
B. | bridge |
C. | gateway |
D. | repeater |
Answer» D. repeater | |
229. |
Which of the following TCP/IP protocol is used for transferring electronicmail messages from one machine to another? |
A. | FTP |
B. | SNMP |
C. | SMTP |
D. | RPC |
Answer» D. RPC | |
230. |
Bridge works in which layer of the OSI model? |
A. | Application layer |
B. | Transport layer |
C. | Network layer |
D. | Data link layer |
Answer» E. | |
231. |
Which of these is not a type of error-reporting message? |
A. | destination unreachable |
B. | source quench |
C. | router error |
D. | time exceeded |
Answer» D. time exceeded | |
232. |
Effective Storage management does not include __________ |
A. | security |
B. | backups |
C. | reporting |
D. | connection |
Answer» E. | |
233. |
RPC allows a computer program to cause a subroutine to execute in _________ |
A. | its own address space |
B. | another address space |
C. | both its own address space and another address space |
D. | applications address space |
Answer» C. both its own address space and another address space | |
234. |
StarBand provides __________ |
A. | ftth internet access |
B. | cable access |
C. | telephone access |
D. | satellite access |
Answer» E. | |
235. |
In SONET, STS-1 level of electrical signalling has the data rate of _________ |
A. | 51.84 mbps |
B. | 155.52 mbps |
C. | 2488.320 mbps |
D. | 622.080 mbps |
Answer» B. 155.52 mbps | |
236. |
In the network HTTP resources are located by __________ |
A. | uniform resource identifier |
B. | unique resource locator |
C. | unique resource identifier |
D. | union resource locator |
Answer» B. unique resource locator | |
237. |
The network layer protocol for internet is __________ |
A. | ethernet |
B. | internet protocol |
C. | hypertext transfer protocol |
D. | file transfer protocol |
Answer» C. hypertext transfer protocol | |
238. |
An RTP header has a minimum size of _________ |
A. | 12 bytes |
B. | 16 bytes |
C. | 24 bytes |
D. | 32 bytes |
Answer» B. 16 bytes | |
239. |
SONET stands for ___________ |
A. | synchronous optical network |
B. | synchronous operational network |
C. | stream optical network |
D. | shell operational network |
Answer» B. synchronous operational network | |
240. |
Transmission control protocol ___________ |
A. | is a connection-oriented protocol |
B. | uses a three way handshake to establish a connection |
C. | receives data from application as a single stream |
D. | all of the mentioned |
Answer» E. | |
241. |
Which protocol below operates at the network layer in the OSI model? |
A. | IP |
B. | ICMP |
C. | RARP |
D. | All of the above |
Answer» E. | |
242. |
In frame relay networks, extended address is used ________ |
A. | to increase the range of data link connection identifiers |
B. | for error detection |
C. | for encryption |
D. | for error recovery |
Answer» B. for error detection | |
243. |
ICMP is used in _________ |
A. | ping |
B. | traceroute |
C. | ifconfig |
D. | both ping & traceroute |
Answer» E. | |
244. |
ATM and frame relay are ________ |
A. | virtual circuit networks |
B. | datagram networks |
C. | virtual private networks |
D. | virtual public networks |
Answer» B. datagram networks | |
245. |
User agent does not support this ___________ |
A. | composing messages |
B. | reading messages |
C. | replying messages |
D. | routing messages |
Answer» E. | |
246. |
How do Storage administrators ensure secure access to storage devices? |
A. | by using zoning |
B. | by putting a physical lock on the storage device |
C. | by keeping devices shutdown when not in use |
D. | by keeping devices when used |
Answer» B. by putting a physical lock on the storage device | |
247. |
Which layer is used to link the network support layers and user supportlayers? |
A. | Session layer |
B. | Data link layer |
C. | Transport layer |
D. | Network layer |
Answer» D. Network layer | |
248. |
Which of the following is false with respect to UDP? |
A. | connection-oriented |
B. | unreliable |
C. | transport layer protocol |
D. | low overhead |
Answer» B. unreliable | |
249. |
Home Access is provided by __________ |
A. | dsl |
B. | fttp |
C. | cable |
D. | all of the mentioned |
Answer» E. | |
250. |
Which of the followings is not a direct implication of subnet masks in TCP/IP networks? |
A. | Reduce network traffic |
B. | Increase network security |
C. | Assignment of more IP addresses |
D. | Better network management |
Answer» D. Better network management | |