

MCQOPTIONS
Saved Bookmarks
This section includes 474 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
351. |
In TDM, slots are further divided into _________ |
A. | seconds |
B. | frames |
C. | packets |
D. | bits |
Answer» C. packets | |
352. |
__________ allows checking if a domain is available for registration. |
A. | domain check |
B. | domain dossier |
C. | domain lookup |
D. | domain registers |
Answer» B. domain dossier | |
353. |
TCP groups a number of bytes together into a packet called _______ |
A. | packet |
B. | buffer |
C. | segment |
D. | stack |
Answer» D. stack | |
354. |
In classless addressing, there are no classes but addresses are still granted in ______ |
A. | ips |
B. | blocks |
C. | codes |
D. | sizes |
Answer» C. codes | |
355. |
______is added to data packet for error detection. |
A. | checksum bit |
B. | error bit |
C. | parity bit |
Answer» D. | |
356. |
assigns a unique number to each IP network adapter called the MAC address. |
A. | Media Access Control |
B. | Metro Access Control |
C. | Metropolitan Access Control |
D. | Both B and C above |
Answer» B. Metro Access Control | |
357. |
In TDM, the transmission rate of a multiplexed path is always the sum of the transmission rates of the signal sources. |
A. | Greater than |
B. | Lesser than |
C. | Equal to |
D. | Equal to or greater than |
Answer» B. Lesser than | |
358. |
WiMAX MAC layer provides an interface between ___________ |
A. | higher transport layers and physical layer |
B. | application layer and network layer |
C. | data link layer and network layer |
D. | session layer and application layer |
Answer» B. application layer and network layer | |
359. |
Which of the following is false with respect to the datagram networks? |
A. | number of flows of packets are not limited |
B. | packets may not be in order at the destination |
C. | path is not reserved |
D. | delay is the same for all packets in a flow |
Answer» E. | |
360. |
AbsoluteTelnet is a telnet client for _______ Operating system. |
A. | windows |
B. | linux |
C. | mac |
D. | ubuntu |
Answer» B. linux | |
361. |
Transport services available to applications in one or another form _________ |
A. | reliable data transfer |
B. | timing |
C. | security |
D. | all of the mentioned |
Answer» E. | |
362. |
_______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. |
A. | Hamming Code |
B. | CRC |
C. | VRC |
D. | None of the above |
Answer» C. VRC | |
363. |
A subset of a network that includes all the routers but contains no loops is called ________ |
A. | spanning tree |
B. | spider structure |
C. | spider tree |
D. | special tree |
Answer» B. spider structure | |
364. |
SMTP is not used to deliver messages to ______ |
A. | user’s terminal |
B. | user’s mailbox |
C. | user’s word processor |
D. | user’s email client |
Answer» D. user’s email client | |
365. |
FTP uses _________ parallel TCP connections to transfer a file. |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» C. 3 | |
366. |
Which port is reserved for use of the SMTP protocol? |
A. | 21 |
B. | 23 |
C. | 25 |
D. | 53 |
Answer» D. 53 | |
367. |
One of the header fields in an IP datagram is the Time to Live (TTL) field.Which of the following statements best explains the need for this field? |
A. | It can be used to prioritize packets |
B. | It can be used to reduce delays |
C. | It can be used to optimize throughput |
D. | It can be used to prevent packet looping |
Answer» E. | |
368. |
If you have to send multimedia data over SMTP it has to be encoded into _______ |
A. | binary |
B. | signal |
C. | ascii |
D. | hash |
Answer» D. hash | |
369. |
This is a time-sensitive service: |
A. | File transfer |
B. | File download |
C. | |
D. | Internet telephony |
Answer» E. | |
370. |
With respect to physical media, STP cables stands for _________ |
A. | shielded twisted pair cable |
B. | spanning tree protocol cable |
C. | static transport protocol cable |
D. | shielded two power cable |
Answer» B. spanning tree protocol cable | |
371. |
Real-time transport protocol (RTP) is mostly used in _________ |
A. | streaming media |
B. | video teleconference |
C. | television services |
D. | all of the mentioned |
Answer» E. | |
372. |
When and where RARP is used intentionally or effectively? |
A. | At the time of network booting where no space to store IP address (or diskless network) for address resolution. |
B. | In broadcasting to get IP address of Network. |
C. | To get the access in private network whenever it is required. |
D. | None of the above. |
Answer» B. In broadcasting to get IP address of Network. | |
373. |
Identify the incorrect statement regarding FTP. |
A. | ftp stands for file transfer protocol |
B. | ftp uses two parallel tcp connections |
C. | ftp sends its control information in-band |
D. | ftp sends exactly one file over the data connection |
Answer» D. ftp sends exactly one file over the data connection | |
374. |
In a piconet, there can be up to ________ parked nodes in the network. |
A. | 63 |
B. | 127 |
C. | 255 |
D. | 511 |
Answer» D. 511 | |
375. |
Which of the following network access standard is used for connectingstations to a circuit-switched network? |
A. | X.3 |
B. | X.21 |
C. | X.25 |
D. | X.75 |
Answer» C. X.25 | |
376. |
If there are n signal sources of same data rate, then the TDMlink has slots. |
A. | N |
B. | n/2 |
C. | n*2 |
D. | 2n |
Answer» B. n/2 | |
377. |
The File Transfer Protocol is built on __________ |
A. | data centric architecture |
B. | service oriented architecture |
C. | client server architecture |
D. | connection oriented architecture |
Answer» D. connection oriented architecture | |
378. |
_________ is the default administrative distance of RIP. |
A. | 0 |
B. | 90 |
C. | 120 |
D. | 130 |
Answer» D. 130 | |
379. |
The value of acknowledgement field in a segment defines _______ |
A. | sequence number of the byte received previously |
B. | total number of bytes to receive |
C. | sequence number of the next byte to be received |
D. | sequence of zeros and ones |
Answer» D. sequence of zeros and ones | |
380. |
How many IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of255.255.255.192? |
A. | 62 |
B. | 126 |
C. | 192 |
D. | 254 |
Answer» B. 126 | |
381. |
What is the maximum size of data that the application layer can pass on tothe TCP layer below? |
A. | Any size |
B. | 2^16 bytes-size of TCP header |
C. | 2^16 bytes |
D. | 1500 bytes |
Answer» B. 2^16 bytes-size of TCP header | |
382. |
Which of the following can be an Ethernet physical address? |
A. | 01:02:01:2C:4B |
B. | 07:01:02:01:2C:4B:2C |
C. | 07:01:02:01:2C:4B |
D. | none of the above |
Answer» D. none of the above | |
383. |
If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is __________. |
A. | 1 kbps |
B. | 1.25 kbps |
C. | 2 kbps |
D. | 10 kbps |
Answer» E. | |
384. |
Delay of the resource allocated during setup phase during data transfer is ________ |
A. | constant |
B. | increases for each packet |
C. | same for each packet |
D. | different for each packet |
Answer» D. different for each packet | |
385. |
IPv6 does not use _________ type of address. |
A. | broadcast |
B. | multicast |
C. | anycast |
D. | unicast |
Answer» B. multicast | |
386. |
A point-to-point protocol over ethernet is a network protocol for __________ |
A. | encapsulating ppp frames inside ethernet frames |
B. | encapsulating ehternet framse inside ppp frames |
C. | for security of ethernet frames |
D. | for security of ppp frames |
Answer» B. encapsulating ehternet framse inside ppp frames | |
387. |
From the options below, which suits best for MODEM? |
A. | a device that modulates an analog carrier signal to encode digital information |
B. | a device that modulates a digital carrier signal to encode analog information |
C. | a device that modulates an analog carrier signal to decode digital information |
D. | a device that modulates a digital carrier signal to decode analoginformation |
Answer» B. a device that modulates a digital carrier signal to encode analog information | |
388. |
The attacker using a network of compromised devices is known as _____________ |
A. | internet |
B. | botnet |
C. | telnet |
D. | d-net |
Answer» C. telnet | |
389. |
Port number used by Network Time Protocol (NTP) with UDP is ________ |
A. | 161 |
B. | 123 |
C. | 162 |
D. | 124 |
Answer» C. 162 | |
390. |
is a standard suite of protocols used for packet switching across computer networks. |
A. | x.22 |
B. | x.23 |
C. | x.25 |
D. | x.26 |
Answer» D. x.26 | |
391. |
In virtual circuit network each packet contains ___________ |
A. | full source and destination address |
B. | a short vc number |
C. | only source address |
D. | only destination address |
Answer» C. only source address | |
392. |
Session layer of the OSI model provides |
A. | Data representation |
B. | Dialog control |
C. | Remote job execution |
D. | Creating logical connections |
Answer» C. Remote job execution | |
393. |
With an IP address of 201.142.23.12, what is your default subnetmask? |
A. | 0.0.0.0 |
B. | 255.0.0.0 |
C. | 255.255.0.0 |
D. | 255.255.255.0 |
Answer» E. | |
394. |
Network addresses are a very important concept of ________ |
A. | routing |
B. | mask |
C. | ip addressing |
D. | classless addressing |
Answer» D. classless addressing | |
395. |
Datagram networks mainly refers to _________ |
A. | connection oriented networks |
B. | connection less networks |
C. | telephone networks |
D. | internetwork |
Answer» C. telephone networks | |
396. |
Which routing protocol below is used by exterior routers between the autonomoussystems? |
A. | RIP |
B. | IGRP |
C. | OSPF |
D. | BGP |
Answer» E. | |
397. |
In Ethernet CSMA/CD, the special bit sequence transmitted by media access management to handle collision is called |
A. | Preamble |
B. | Post amble |
C. | Jam |
D. | None of the above |
Answer» D. None of the above | |
398. |
Which of the following system calls results in the sending of SYNpackets? |
A. | socket |
B. | bind |
C. | listen |
D. | connect |
Answer» E. | |
399. |
Which one of the following functionalities aren’t provided by TCP? |
A. | Flow control |
B. | Addressing |
C. | Retransmission of packets as required |
D. | Proper sequencing of the packets |
Answer» C. Retransmission of packets as required | |
400. |
In FTP protocol, a client contacts a server using ______ as the transport protocol. |
A. | transmission control protocol |
B. | user datagram protocol |
C. | datagram congestion control protocol |
D. | stream control transmission protocol |
Answer» B. user datagram protocol | |