Explore topic-wise MCQs in Computer Science.

This section includes 474 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.

401.

The size of an IP address in IPv6 is _________

A. 32 bits
B. 64 bits
C. 128 bits
D. 265 bits
Answer» D. 265 bits
402.

Which of the following below is/are the capability of ICMP protocol?

A. Report package count
B. Report network congestion
C. Both band d
D. Report availability of remote hosts
Answer» D. Report availability of remote hosts
403.

What is the difference between ring and bustopology?

A. In Ring, all nodes are connected with another in a loop while in the bus they are connected to a central cable
B. In Ring, all nodes are connected with another loop while on a bus they are connected to a central cable
C. In the bus, all nodes are connected with another in a loop while instar they are connected to a centralbnode
D. In Bus all nodes are connected with another loop while instar they are connected to a central cable
Answer» B. In Ring, all nodes are connected with another loop while on a bus they are connected to a central cable
404.

An alternative to JavaScript on windows platform is _______

A. vbscript
B. asp.net
C. jsp
D. php
Answer» B. asp.net
405.

A stream socket provides _________ communications between a client and a server

A. One way
B. Two way
Answer» C.
406.

ONT is connected to splitter using _________

A. high speed fibre cable
B. hfc
C. optical cable
D. twisted pair cable
Answer» D. twisted pair cable
407.

WiMAX uses the _________

A. orthogonal frequency division multiplexing
B. time division multiplexing
C. space division multiplexing
D. channel division multiplexing
Answer» B. time division multiplexing
408.

IPv6 does not use ________ type of address.

A. broadcast
B. multicast
C. any cast
D. unicast
Answer» B. multicast
409.

In IPv6 addresses, addresses that start with eight 0s are called ________

A. unicast addresses
B. multicast addresses
C. any cast addresses
D. reserved addresses
Answer» E.
410.

The decimal code of Interpret as Command (IAC) character is _______

A. 252
B. 253
C. 254
D. 255
Answer» E.
411.

The combination of an IP address and a port number is known as.

A. network number
B. socket address
C. subnet mask number
D. MAC address
Answer» C. subnet mask number
412.

RTP is used to ________

A. carry the media stream
B. monitor transmission statistics of streams
C. monitor quality of service of streams
D. secure the stream
Answer» B. monitor transmission statistics of streams
413.

Which of the following is reliable communication?

A. TCP
B. IP
C. UPD
D. All of them
Answer» B. IP
414.

Which methods are commonly used in Server Socket class?

A. public output stream get output stream ()
B. public socket accept ()
C. public synchronized void close ()
D. public void connect ()
Answer» C. public synchronized void close ()
415.

An interconnected collection of piconet is called ___________

A. scatternet
B. micronet
C. mininet
D. multinet
Answer» B. micronet
416.

RPC is a _________

A. synchronous operation
B. asynchronous operation
C. time independent operation
D. channel specific operation
Answer» B. asynchronous operation
417.

Sending a file from your personal computer's primary memory or disk toanother computer is called

A. uploading
B. downloading
C. logging on
D. hangs on
Answer» B. downloading
418.

Which address is used on the internet for employing the TCP/IP protocols?

A. physical address and logical address
B. port address
C. specific address
D. all of the mentioned
Answer» E.
419.

WPA2 is used for security in _______

A. ethernet
B. bluetooth
C. wi-fi
D. e-mail
Answer» D. e-mail
420.

To join the internet, the computer has to be connected to a _________

A. internet architecture board
B. internet society
C. internet service provider
D. different computer
Answer» D. different computer
421.

In IPv4 Addresses, classful addressing is replaced with ________

A. classless addressing
B. classful addressing
C. classful advertising
D. classless advertising
Answer» B. classful addressing
422.

A packet filter firewall filters at __________

A. physical layer
B. data link layer
C. network layer or transport layer
D. application layer
Answer» D. application layer
423.

Which of the following is a form of DoS attack?

A. vulnerability attack
B. bandwidth flooding
C. connection flooding
D. all of the mentioned
Answer» E.
424.

Virtual circuit identifier in frame relay is called ______

A. data link connection identifier
B. frame relay identifier
C. cell relay identifier
D. circuit connection identifier
Answer» B. frame relay identifier
425.

What is the difference between ring and bus topology?

A. In Ring, all nodes are connected with another in a loop while in the bus they are connected to a central cable
B. In Ring, all nodes are connected with another loop while on a bus they are connected to a central cable
C. In the bus, all nodes are connected with another in a loop while instar they are connected to a central node
D. In Bus all nodes are connected with another loop while instar they are connected to a central cable
Answer» B. In Ring, all nodes are connected with another loop while on a bus they are connected to a central cable
426.

A proxy firewall filters at _________

A. physical layer
B. data link layer
C. network layer
D. application layer
Answer» E.
427.

Consider different activities related to email. m1:Send an email from a mail client to mail server m2:Download an email from mailbox server to a mail client m3:Checking email in a web browserWhich is the applicable level protocol user in each activity?

A. m1:HTTP, m2:SMTP, m3:POP
B. m1:SMTP, m2:FTP, m3:HTTP
C. m1:SMTP, m2:POP, m3:HTTP
D. m1:POP, m2:SMTP, m3:IMAP
Answer» D. m1:POP, m2:SMTP, m3:IMAP
428.

_______ assigns a unique number to each IP network adapter called the MAC address.

A. Media Access Control
B. Metro Access Control
C. Metropolitan Access Control
D. Both B and C above
Answer» B. Metro Access Control
429.

A stream socket provides communications between a client and a server

A. One way
B. Two way
C. none
D. other
Answer» C. none
430.

When displaying a web page, the application layer uses the:

A. HTTP protocol
B. FTP protocol
C. SMTP protocol
D. none of the mentioned
Answer» B. FTP protocol
431.

Multiple processes on destinations at transport layer are identified by __________

A. mac address
B. port number
C. host number
D. host address
Answer» C. host number
432.

Next-Hop Method is used to reduce contents of a _________

A. revolving table
B. rotating table
C. routing table
D. re-allocate table
Answer» D. re-allocate table
433.

In frame relay networks, extended address is used _______

A. to increase the range of data link connection identifiers
B. for error detection
C. for encryption
D. for error recovery
Answer» B. for error detection
434.

During error reporting, ICMP always reports error messages to ________

A. destination
B. source
C. next router
D. previous router
Answer» C. next router
435.

What is the max length of the Shielded twisted pair cable?

A. 100 ft
B. 200 ft
C. 100 m
D. 200 m
Answer» D. 200 m
436.

FTP server _____________

A. maintains state information
B. is stateless
C. has single tcp connection for a file transfer
D. has udp connection for file transfer
Answer» B. is stateless
437.

Ping sweep is a part of _________

A. traceroute
B. nmap
C. route
D. ipconfig
Answer» C. route
438.

Structure of Management Information (SMI), is the guideline of ________

A. http
B. snmp
C. url
D. mib
Answer» C. url
439.

The first Network was called

A. CNNET
B. NSFNET
C. ASAPNET
D. ARPANET
Answer» E.
440.

IP4 is more commonly used than IPv6?

A. True
B. False
C. none
D. other
Answer» B. False
441.

Transport layer protocols deals with ____________

A. application to application communication
B. process to process communication
C. node to node communication
D. man to man communication
Answer» C. node to node communication
442.

Which of the following is true for secure shell tunneling?

A. To set up an SSH tunnel, one configures an SSH client to forward a specified local port
B. SSH tunnels provide a means to not bypassfirewalls
C. All SSH clients support dynamic port forwarding
D. Both A and B
Answer» B. SSH tunnels provide a means to not bypassfirewalls
443.

The application layer protocol used by a Telnet application is ________

A. telnet
B. ftp
C. http
D. smtp
Answer» B. ftp
444.

Network layer firewall has two sub-categories called ____________

A. stateful firewall and stateless firewall
B. bit oriented firewall and byte oriented firewall
C. frame firewall and packet firewall
D. network firewall and data firewall
Answer» B. bit oriented firewall and byte oriented firewall
445.

Which of the following is not related to ipconfig in Microsoft Windows?

A. display all current tcp/ip network configuration values
B. modify dhcp settings
C. modify dns settings
D. trace the routers in the path to destination
Answer» E.
446.

BER stands for ________

A. basic encoding rules
B. basic encoding resolver
C. basic encoding rotator
D. basic encoding router
Answer» B. basic encoding resolver
447.

Which of the following is an example of user agents for e-mail?

A. microsoft outlook
B. facebook
C. google
D. tumblr
Answer» B. facebook
448.

Both ping and tracert are used to find If the computer is in the network.

A. True
B. False
C. none
D. other
Answer» C. none
449.

In an IPv6 header, the traffic class field is similar to which field in the IPv4 header?

A. fragmentation field
B. fast switching
C. tos field
D. option field
Answer» D. option field
450.

Beyond IP, UDP provides additional services such as _______

A. routing and switching
B. sending and receiving of packets
C. multiplexing and demultiplexing
D. demultiplexing and error checking
Answer» E.