Explore topic-wise MCQs in Computer Science.

This section includes 474 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.

201.

Station A needs to send a message consisting of 9 packets to Station B using a sliding window (window size 3) and go-back-n error control strategy. All packets are ready and immediately available for transmission. If every 5th packet that A transmits gets lost (but no acks from B ever get lost), then what isthe number of packets that A will transmit for sending the message to B?

A. 12
B. 14
C. 16
D. 18
Answer» D. 18
202.

The communication mode that supports data in both directions at the sametime is

A. simplex
B. half-duplex
C. full-duplex
D. multiplex
Answer» D. multiplex
203.

Which of the following protocols below work in the application layer?

A. POP
B. PPP
C. FTP
D. Both a and d above
Answer» E.
204.

In File Transfer Protocol, data transfer cannot be done in __________

A. stream mode
B. block mode
C. compressed mode
D. message mode
Answer» E.
205.

If a file consisting of 50,000 characters takes 40 seconds to send, then thedata rate is .

A. 1 kbps
B. 1.25 kbps
C. 2 kbps
D. 10 kbps
Answer» E.
206.

A network router joins two together?

A. Computers
B. Switches
C. Networks
D. Gateway
Answer» D. Gateway
207.

Which among the following features is present in IPv6 but not in IPv4?

A. fragmentation
B. header checksum
C. options
D. anycast address
Answer» E.
208.

Which of the following below is a loopback IPaddress?

A. 127.0.0.0
B. 127.0.1.1
C. 127.0.1.0
D. 127.0.0.1
Answer» E.
209.

Which multicast address does the OSPF Hello protocol use?

A. 224.0.0.5
B. 224.0.0.6
C. 224.0.0.7
D. 224.0.0.8
Answer» B. 224.0.0.6
210.

A linear SONET network can be ________

A. point-to-point
B. multi-point
C. both point-to-point and multi-point
D. single point
Answer» D. single point
211.

TCP, FTP, Telnet, SMTP, POP etc. are examples of ___________

A. socket
B. ip address
C. protocol
D. mac address
Answer» D. mac address
212.

In SONET, each synchronous transfer signal STS-n is composed of __________

A. 2000 frames
B. 4000 frames
C. 8000 frames
D. 16000 frames
Answer» D. 16000 frames
213.

Which of the following HTTP methods should be idempotent in nature?

A. options
B. delete
C. post
D. head
Answer» C. post
214.

Sniffers can be prevented by using _______________

A. wired environment
B. wifi
C. ethernet lan
D. switched network
Answer» E.
215.

Delay of the resource allocated on demand during data transfer is ________

A. constant
B. increases for each packet
C. same for each packet
D. different for each packet
Answer» E.
216.

In wireless ad-hoc network _________

A. access point is not required
B. access point is must
C. nodes are not required
D. all nodes are access points
Answer» B. access point is must
217.

When displaying a web page, the application layer uses the _____________

A. http protocol
B. ftp protocol
C. smtp protocol
D. tcp protocol
Answer» B. ftp protocol
218.

Which of the IP headers decides when the packet should be discarded?

A. Fragment control
B. TTL
C. Checksum
D. Header length
Answer» C. Checksum
219.

Your company has a LAN in its downtown office and has now set up aLAN in the manufacturing plant in the suburbs. To enable everyone to share data and resources between the two LANs, what type of device(s) are needed to connect them? Choose the most correct answer.

A. Modem
B. Cable
C. Hub
D. Router
Answer» E.
220.

NAT stands for .

A. network address transformer
B. network address translator
C. network address translation
D. Both B and C above
Answer» D. Both B and C above
221.

Multiplexing provides _________

A. efficiency
B. privacy
C. anti jamming
D. both efficiency & privacy
Answer» E.
222.

Transmission data rate is decided by ____________

A. network layer
B. physical layer
C. data link layer
D. transport layer
Answer» C. data link layer
223.

Network layer firewall has two sub-categories as _________

A. state full firewall and stateless firewall
B. bit oriented firewall and byte oriented firewall
C. frame firewall and packet firewall
D. network layer firewall and session layer firewall
Answer» B. bit oriented firewall and byte oriented firewall
224.

If 5 files are transferred from server A to client B in the same session. Thenumber of TCP connection between A and B is:

A. 5
B. 10
C. 2
D. 6
Answer» E.
225.

_______ topology requires a multipoint connection.

A. star
B. mesh
C. ring
D. bus
Answer» E.
226.

The performance of a data communication network depends on

A. The number of users
B. The transmission media
C. The hardware and software
D. All of the above
Answer» E.
227.

Full duplex mode increases the capacity of each domain by ________

A. 10 to 20 mbps
B. 20 to 30 mbps
C. 30 to 40 mbps
D. 40 to 50 mbps
Answer» B. 20 to 30 mbps
228.

Which of the following device is used to connect two systems, especially ifthe systems use different protocols?

A. hub
B. bridge
C. gateway
D. repeater
Answer» D. repeater
229.

Which of the following TCP/IP protocol is used for transferring electronicmail messages from one machine to another?

A. FTP
B. SNMP
C. SMTP
D. RPC
Answer» D. RPC
230.

Bridge works in which layer of the OSI model?

A. Application layer
B. Transport layer
C. Network layer
D. Data link layer
Answer» E.
231.

Which of these is not a type of error-reporting message?

A. destination unreachable
B. source quench
C. router error
D. time exceeded
Answer» D. time exceeded
232.

Effective Storage management does not include __________

A. security
B. backups
C. reporting
D. connection
Answer» E.
233.

RPC allows a computer program to cause a subroutine to execute in _________

A. its own address space
B. another address space
C. both its own address space and another address space
D. applications address space
Answer» C. both its own address space and another address space
234.

StarBand provides __________

A. ftth internet access
B. cable access
C. telephone access
D. satellite access
Answer» E.
235.

In SONET, STS-1 level of electrical signalling has the data rate of _________

A. 51.84 mbps
B. 155.52 mbps
C. 2488.320 mbps
D. 622.080 mbps
Answer» B. 155.52 mbps
236.

In the network HTTP resources are located by __________

A. uniform resource identifier
B. unique resource locator
C. unique resource identifier
D. union resource locator
Answer» B. unique resource locator
237.

The network layer protocol for internet is __________

A. ethernet
B. internet protocol
C. hypertext transfer protocol
D. file transfer protocol
Answer» C. hypertext transfer protocol
238.

An RTP header has a minimum size of _________

A. 12 bytes
B. 16 bytes
C. 24 bytes
D. 32 bytes
Answer» B. 16 bytes
239.

SONET stands for ___________

A. synchronous optical network
B. synchronous operational network
C. stream optical network
D. shell operational network
Answer» B. synchronous operational network
240.

Transmission control protocol ___________

A. is a connection-oriented protocol
B. uses a three way handshake to establish a connection
C. receives data from application as a single stream
D. all of the mentioned
Answer» E.
241.

Which protocol below operates at the network layer in the OSI model?

A. IP
B. ICMP
C. RARP
D. All of the above
Answer» E.
242.

In frame relay networks, extended address is used ________

A. to increase the range of data link connection identifiers
B. for error detection
C. for encryption
D. for error recovery
Answer» B. for error detection
243.

ICMP is used in _________

A. ping
B. traceroute
C. ifconfig
D. both ping & traceroute
Answer» E.
244.

ATM and frame relay are ________

A. virtual circuit networks
B. datagram networks
C. virtual private networks
D. virtual public networks
Answer» B. datagram networks
245.

User agent does not support this ___________

A. composing messages
B. reading messages
C. replying messages
D. routing messages
Answer» E.
246.

How do Storage administrators ensure secure access to storage devices?

A. by using zoning
B. by putting a physical lock on the storage device
C. by keeping devices shutdown when not in use
D. by keeping devices when used
Answer» B. by putting a physical lock on the storage device
247.

Which layer is used to link the network support layers and user supportlayers?

A. Session layer
B. Data link layer
C. Transport layer
D. Network layer
Answer» D. Network layer
248.

Which of the following is false with respect to UDP?

A. connection-oriented
B. unreliable
C. transport layer protocol
D. low overhead
Answer» B. unreliable
249.

Home Access is provided by __________

A. dsl
B. fttp
C. cable
D. all of the mentioned
Answer» E.
250.

Which of the followings is not a direct implication of subnet masks in TCP/IP networks?

A. Reduce network traffic
B. Increase network security
C. Assignment of more IP addresses
D. Better network management
Answer» D. Better network management