

MCQOPTIONS
Saved Bookmarks
This section includes 36 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which organization has authority over interstate and international commerce in the communications field? |
A. | ITU-T |
B. | IEEE |
C. | FCC |
D. | ISOC |
Answer» D. ISOC | |
2. |
Match the following:(P) SMTP (1) Application layer(Q) BGP (2) Transport layer(R) TCP (3) Data link layer(S) PPP (4) Network layer(5) Physical layer |
A. | P 2 Q 1 R 3 S 5 |
B. | P 1 Q 4 R 2 S 3 |
C. | P 1 Q 4 R 2 S 5 |
D. | P 2 Q 4 R 1 S 3 |
Answer» C. P 1 Q 4 R 2 S 5 | |
3. |
In Ethernet CSMA/CD, the special bit sequence transmitted by media access management to handle collision is called |
A. | Preamble |
B. | Post amble |
C. | Jam |
D. | None of the above |
Answer» D. None of the above | |
4. |
Sending a file from your personal computer's primary memory or disk to another computer is called |
A. | uploading |
B. | downloading |
C. | logging on |
D. | hangs on |
Answer» B. downloading | |
5. |
Consider different activities related to email.m1:Send an email from a mail client to mail serverm2:Download an email from mailbox server to a mail clientm3:Checking email in a web browserWhich is the applicable level protocol user in each activity? |
A. | m1:HTTP, m2:SMTP, m3:POP |
B. | m1:SMTP, m2:FTP, m3:HTTP |
C. | m1:SMTP, m2:POP, m3:HTTP |
D. | m1:POP, m2:SMTP, m3:IMAP |
Answer» D. m1:POP, m2:SMTP, m3:IMAP | |
6. |
Consider different activities related to email. m1:Send an email from a mail client to mail server m2:Download an email from mailbox server to a mail client m3:Checking email in a web browser Which is the applicable level protocol user in each activity? |
A. | m1:HTTP, m2:SMTP, m3:POP |
B. | m1:SMTP, m2:FTP, m3:HTTP |
C. | m1:SMTP, m2:POP, m3:HTTP |
D. | m1:POP, m2:SMTP, m3:IMAP |
Answer» D. m1:POP, m2:SMTP, m3:IMAP | |
7. |
Which of the following network access standard is used for connecting stations to a circuit-switched network? |
A. | X.3 |
B. | X.21 |
C. | X.25 |
D. | X.75 |
Answer» C. X.25 | |
8. |
If 5 files are transferred from server A to client B in the same session. The number of TCP connection between A and B is: |
A. | 5 |
B. | 10 |
C. | 2 |
D. | 6 |
Answer» E. | |
9. |
In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is . |
A. | 2 bytes |
B. | 1 bytes |
C. | 4 bytes |
D. | 5 bytes |
Answer» E. | |
10. |
In an Ethernet local area network, which one of the following statementsis TRUE? |
A. | A station stops to sense the channel once it starts transmitting a frame. |
B. | The purpose of the jamming signal is to pad the frames that are smallerthan the minimum frame size. |
C. | A station continues to transmit the packet even after the collision is detected. |
D. | The exponential back off mechanism reduces the probability of collision on retransmissions |
Answer» E. | |
11. |
Piconets in the blue tooth a minimum of two and amaximum of Bluetooth peer devices. |
A. | five |
B. | eight |
C. | nine |
D. | four |
Answer» C. nine | |
12. |
Piconets in the blue tooth a minimum of two and a maximum of ____________ Bluetooth peer devices. |
A. | five |
B. | eight |
C. | nine |
D. | four |
Answer» C. nine | |
13. |
If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is . |
A. | 1 kbps |
B. | 1.25 kbps |
C. | 2 kbps |
D. | 10 kbps |
Answer» E. | |
14. |
If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is __________. |
A. | 1 kbps |
B. | 1.25 kbps |
C. | 2 kbps |
D. | 10 kbps |
Answer» E. | |
15. |
Which of the following TCP/IP protocol is used for transferringelectronic mail messages from one machine to another? |
A. | FTP |
B. | SNMP |
C. | SMTP |
D. | RPC |
Answer» D. RPC | |
16. |
What is the maximum size of data that the application layer can pass on to the TCP layer below? |
A. | Any size |
B. | 2^16 bytes-size of TCP header |
C. | 2^16 bytes |
D. | 1500 bytes |
Answer» B. 2^16 bytes-size of TCP header | |
17. |
Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? |
A. | FTP |
B. | SNMP |
C. | SMTP |
D. | RPC |
Answer» D. RPC | |
18. |
9 93. Determine the maximum length of the cable (in km) for transmitting data at a rate of 500 Mbps in an Ethernet LAN with frames of size 10,000 bits. Assume the signal speed in the cable to be 2,00,000 km/s. |
A. | 1 |
B. | 2 |
C. | 2.5 |
D. | 5 |
Answer» C. 2.5 | |
19. |
In the slow start phase of the TCP congestion control algorithm, the size of the congestion window |
A. | does not increase |
B. | increases linearly |
C. | increases quadratically |
D. | increases exponentially |
Answer» E. | |
20. |
Which one of the following routing algorithm can be used for network layer design? |
A. | shortest path algorithm |
B. | distance vector routing |
C. | link state routing |
D. | all of the mentioned |
Answer» E. | |
21. |
Which of the following device is used to connect two systems, especiallyif the systems use different protocols? |
A. | hub |
B. | bridge |
C. | gateway |
D. | repeater |
Answer» D. repeater | |
22. |
Which of the following device is used to connect two systems, especially if the systems use different protocols? |
A. | hub |
B. | bridge |
C. | gateway |
D. | repeater |
Answer» D. repeater | |
23. |
What will be the efficiency of a Stop and Wait protocol, if the transmission time for a frame is 20ns and the propagation time is 30ns? |
A. | 20% |
B. | 25% |
C. | 40% |
D. | 66% |
Answer» C. 40% | |
24. |
can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. |
A. | Hamming Code |
B. | CRC |
C. | VRC |
D. | None of the above |
Answer» C. VRC | |
25. |
_______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. |
A. | Hamming Code |
B. | CRC |
C. | VRC |
D. | None of the above |
Answer» C. VRC | |
26. |
The communication mode that supports data in both directions at the same time is |
A. | simplex |
B. | half-duplex |
C. | full-duplex |
D. | multiplex |
Answer» D. multiplex | |
27. |
In OSI model, which of the following layer provides error-free delivery of data? |
A. | Data link |
B. | Network |
C. | transport |
D. | Session |
Answer» D. Session | |
28. |
A subset of a network that includes all the routers but contains no loops is called: |
A. | spanning tree |
B. | spider structure |
C. | spider tree |
D. | none of the mentioned |
Answer» B. spider structure | |
29. |
A subset of a network that includes all the routers but contains no loopsis called: |
A. | spanning tree |
B. | spider structure |
C. | spider tree |
D. | none of the mentioned |
Answer» B. spider structure | |
30. |
An endpoint of an inter-process communication flow across a computer network is called: |
A. | socket |
B. | pipe |
C. | port |
D. | none of the mentioned |
Answer» B. pipe | |
31. |
In serial data transmission, every byte of data is padded with a 0 in the beginning and one or two 1 s at the end of byte because |
A. | Receiver is to be synchronized for byte reception |
B. | Receiver recovers lost 0 and 1 s from these padded bits |
C. | Padded bits are useful in parity computation |
D. | None of these |
Answer» B. Receiver recovers lost 0 and 1 s from these padded bits | |
32. |
How many IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192? |
A. | 62 |
B. | 126 |
C. | 192 |
D. | 254 |
Answer» B. 126 | |
33. |
A small network making up the Internet and also having a small numbers of computers within it is called |
A. | Host |
B. | Address |
C. | Subdomain |
D. | None of the above |
Answer» D. None of the above | |
34. |
The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard? |
A. | CSMA/CD |
B. | Token passing |
C. | Collision detection |
D. | Time sharing |
Answer» C. Collision detection | |
35. |
One of the header fields in an IP datagram is the Time to Live (TTL) field. Which of the following statements best explains the need for this field? |
A. | It can be used to prioritize packets |
B. | It can be used to reduce delays |
C. | It can be used to optimize throughput |
D. | It can be used to prevent packet looping |
Answer» E. | |
36. |
Message Oriented Middleware allows general purpose messages to be exchanged in a Client/Server system using message queues. |
A. | True |
B. | False |
Answer» B. False | |