Explore topic-wise MCQs in Computer Science.

This section includes 474 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.

351.

In TDM, slots are further divided into _________

A. seconds
B. frames
C. packets
D. bits
Answer» C. packets
352.

__________ allows checking if a domain is available for registration.

A. domain check
B. domain dossier
C. domain lookup
D. domain registers
Answer» B. domain dossier
353.

TCP groups a number of bytes together into a packet called _______

A. packet
B. buffer
C. segment
D. stack
Answer» D. stack
354.

In classless addressing, there are no classes but addresses are still granted in ______

A. ips
B. blocks
C. codes
D. sizes
Answer» C. codes
355.

______is added to data packet for error detection.

A. checksum bit
B. error bit
C. parity bit
Answer» D.
356.

assigns a unique number to each IP network adapter called the MAC address.

A. Media Access Control
B. Metro Access Control
C. Metropolitan Access Control
D. Both B and C above
Answer» B. Metro Access Control
357.

In TDM, the transmission rate of a multiplexed path is always the sum of the transmission rates of the signal sources.

A. Greater than
B. Lesser than
C. Equal to
D. Equal to or greater than
Answer» B. Lesser than
358.

WiMAX MAC layer provides an interface between ___________

A. higher transport layers and physical layer
B. application layer and network layer
C. data link layer and network layer
D. session layer and application layer
Answer» B. application layer and network layer
359.

Which of the following is false with respect to the datagram networks?

A. number of flows of packets are not limited
B. packets may not be in order at the destination
C. path is not reserved
D. delay is the same for all packets in a flow
Answer» E.
360.

AbsoluteTelnet is a telnet client for _______ Operating system.

A. windows
B. linux
C. mac
D. ubuntu
Answer» B. linux
361.

Transport services available to applications in one or another form _________

A. reliable data transfer
B. timing
C. security
D. all of the mentioned
Answer» E.
362.

_______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits.

A. Hamming Code
B. CRC
C. VRC
D. None of the above
Answer» C. VRC
363.

A subset of a network that includes all the routers but contains no loops is called ________

A. spanning tree
B. spider structure
C. spider tree
D. special tree
Answer» B. spider structure
364.

SMTP is not used to deliver messages to ______

A. user’s terminal
B. user’s mailbox
C. user’s word processor
D. user’s email client
Answer» D. user’s email client
365.

FTP uses _________ parallel TCP connections to transfer a file.

A. 1
B. 2
C. 3
D. 4
Answer» C. 3
366.

Which port is reserved for use of the SMTP protocol?

A. 21
B. 23
C. 25
D. 53
Answer» D. 53
367.

One of the header fields in an IP datagram is the Time to Live (TTL) field.Which of the following statements best explains the need for this field?

A. It can be used to prioritize packets
B. It can be used to reduce delays
C. It can be used to optimize throughput
D. It can be used to prevent packet looping
Answer» E.
368.

If you have to send multimedia data over SMTP it has to be encoded into _______

A. binary
B. signal
C. ascii
D. hash
Answer» D. hash
369.

This is a time-sensitive service:

A. File transfer
B. File download
C. E-mail
D. Internet telephony
Answer» E.
370.

With respect to physical media, STP cables stands for _________

A. shielded twisted pair cable
B. spanning tree protocol cable
C. static transport protocol cable
D. shielded two power cable
Answer» B. spanning tree protocol cable
371.

Real-time transport protocol (RTP) is mostly used in _________

A. streaming media
B. video teleconference
C. television services
D. all of the mentioned
Answer» E.
372.

When and where RARP is used intentionally or effectively?

A. At the time of network booting where no space to store IP address (or diskless network) for address resolution.
B. In broadcasting to get IP address of Network.
C. To get the access in private network whenever it is required.
D. None of the above.
Answer» B. In broadcasting to get IP address of Network.
373.

Identify the incorrect statement regarding FTP.

A. ftp stands for file transfer protocol
B. ftp uses two parallel tcp connections
C. ftp sends its control information in-band
D. ftp sends exactly one file over the data connection
Answer» D. ftp sends exactly one file over the data connection
374.

In a piconet, there can be up to ________ parked nodes in the network.

A. 63
B. 127
C. 255
D. 511
Answer» D. 511
375.

Which of the following network access standard is used for connectingstations to a circuit-switched network?

A. X.3
B. X.21
C. X.25
D. X.75
Answer» C. X.25
376.

If there are n signal sources of same data rate, then the TDMlink has slots.

A. N
B. n/2
C. n*2
D. 2n
Answer» B. n/2
377.

The File Transfer Protocol is built on __________

A. data centric architecture
B. service oriented architecture
C. client server architecture
D. connection oriented architecture
Answer» D. connection oriented architecture
378.

_________ is the default administrative distance of RIP.

A. 0
B. 90
C. 120
D. 130
Answer» D. 130
379.

The value of acknowledgement field in a segment defines _______

A. sequence number of the byte received previously
B. total number of bytes to receive
C. sequence number of the next byte to be received
D. sequence of zeros and ones
Answer» D. sequence of zeros and ones
380.

How many IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of255.255.255.192?

A. 62
B. 126
C. 192
D. 254
Answer» B. 126
381.

What is the maximum size of data that the application layer can pass on tothe TCP layer below?

A. Any size
B. 2^16 bytes-size of TCP header
C. 2^16 bytes
D. 1500 bytes
Answer» B. 2^16 bytes-size of TCP header
382.

Which of the following can be an Ethernet physical address?

A. 01:02:01:2C:4B
B. 07:01:02:01:2C:4B:2C
C. 07:01:02:01:2C:4B
D. none of the above
Answer» D. none of the above
383.

If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is __________.

A. 1 kbps
B. 1.25 kbps
C. 2 kbps
D. 10 kbps
Answer» E.
384.

Delay of the resource allocated during setup phase during data transfer is ________

A. constant
B. increases for each packet
C. same for each packet
D. different for each packet
Answer» D. different for each packet
385.

IPv6 does not use _________ type of address.

A. broadcast
B. multicast
C. anycast
D. unicast
Answer» B. multicast
386.

A point-to-point protocol over ethernet is a network protocol for __________

A. encapsulating ppp frames inside ethernet frames
B. encapsulating ehternet framse inside ppp frames
C. for security of ethernet frames
D. for security of ppp frames
Answer» B. encapsulating ehternet framse inside ppp frames
387.

From the options below, which suits best for MODEM?

A. a device that modulates an analog carrier signal to encode digital information
B. a device that modulates a digital carrier signal to encode analog information
C. a device that modulates an analog carrier signal to decode digital information
D. a device that modulates a digital carrier signal to decode analoginformation
Answer» B. a device that modulates a digital carrier signal to encode analog information
388.

The attacker using a network of compromised devices is known as _____________

A. internet
B. botnet
C. telnet
D. d-net
Answer» C. telnet
389.

Port number used by Network Time Protocol (NTP) with UDP is ________

A. 161
B. 123
C. 162
D. 124
Answer» C. 162
390.

is a standard suite of protocols used for packet switching across computer networks.

A. x.22
B. x.23
C. x.25
D. x.26
Answer» D. x.26
391.

In virtual circuit network each packet contains ___________

A. full source and destination address
B. a short vc number
C. only source address
D. only destination address
Answer» C. only source address
392.

Session layer of the OSI model provides

A. Data representation
B. Dialog control
C. Remote job execution
D. Creating logical connections
Answer» C. Remote job execution
393.

With an IP address of 201.142.23.12, what is your default subnetmask?

A. 0.0.0.0
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.0
Answer» E.
394.

Network addresses are a very important concept of ________

A. routing
B. mask
C. ip addressing
D. classless addressing
Answer» D. classless addressing
395.

Datagram networks mainly refers to _________

A. connection oriented networks
B. connection less networks
C. telephone networks
D. internetwork
Answer» C. telephone networks
396.

Which routing protocol below is used by exterior routers between the autonomoussystems?

A. RIP
B. IGRP
C. OSPF
D. BGP
Answer» E.
397.

In Ethernet CSMA/CD, the special bit sequence transmitted by media access management to handle collision is called

A. Preamble
B. Post amble
C. Jam
D. None of the above
Answer» D. None of the above
398.

Which of the following system calls results in the sending of SYNpackets?

A. socket
B. bind
C. listen
D. connect
Answer» E.
399.

Which one of the following functionalities aren’t provided by TCP?

A. Flow control
B. Addressing
C. Retransmission of packets as required
D. Proper sequencing of the packets
Answer» C. Retransmission of packets as required
400.

In FTP protocol, a client contacts a server using ______ as the transport protocol.

A. transmission control protocol
B. user datagram protocol
C. datagram congestion control protocol
D. stream control transmission protocol
Answer» B. user datagram protocol