Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 36 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

1.

Which organization has authority over interstate and international commerce in the communications field?

A. ITU-T
B. IEEE
C. FCC
D. ISOC
Answer» D. ISOC
2.

Match the following:(P) SMTP (1) Application layer(Q) BGP (2) Transport layer(R) TCP (3) Data link layer(S) PPP (4) Network layer(5) Physical layer

A. P 2 Q 1 R 3 S 5
B. P 1 Q 4 R 2 S 3
C. P 1 Q 4 R 2 S 5
D. P 2 Q 4 R 1 S 3
Answer» C. P 1 Q 4 R 2 S 5
3.

In Ethernet CSMA/CD, the special bit sequence transmitted by media access management to handle collision is called

A. Preamble
B. Post amble
C. Jam
D. None of the above
Answer» D. None of the above
4.

Sending a file from your personal computer's primary memory or disk to another computer is called

A. uploading
B. downloading
C. logging on
D. hangs on
Answer» B. downloading
5.

Consider different activities related to email.m1:Send an email from a mail client to mail serverm2:Download an email from mailbox server to a mail clientm3:Checking email in a web browserWhich is the applicable level protocol user in each activity?

A. m1:HTTP, m2:SMTP, m3:POP
B. m1:SMTP, m2:FTP, m3:HTTP
C. m1:SMTP, m2:POP, m3:HTTP
D. m1:POP, m2:SMTP, m3:IMAP
Answer» D. m1:POP, m2:SMTP, m3:IMAP
6.

Consider different activities related to email. m1:Send an email from a mail client to mail server m2:Download an email from mailbox server to a mail client m3:Checking email in a web browser Which is the applicable level protocol user in each activity?

A. m1:HTTP, m2:SMTP, m3:POP
B. m1:SMTP, m2:FTP, m3:HTTP
C. m1:SMTP, m2:POP, m3:HTTP
D. m1:POP, m2:SMTP, m3:IMAP
Answer» D. m1:POP, m2:SMTP, m3:IMAP
7.

Which of the following network access standard is used for connecting stations to a circuit-switched network?

A. X.3
B. X.21
C. X.25
D. X.75
Answer» C. X.25
8.

If 5 files are transferred from server A to client B in the same session. The number of TCP connection between A and B is:

A. 5
B. 10
C. 2
D. 6
Answer» E.
9.

In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is .

A. 2 bytes
B. 1 bytes
C. 4 bytes
D. 5 bytes
Answer» E.
10.

In an Ethernet local area network, which one of the following statementsis TRUE?

A. A station stops to sense the channel once it starts transmitting a frame.
B. The purpose of the jamming signal is to pad the frames that are smallerthan the minimum frame size.
C. A station continues to transmit the packet even after the collision is detected.
D. The exponential back off mechanism reduces the probability of collision on retransmissions
Answer» E.
11.

Piconets in the blue tooth a minimum of two and amaximum of Bluetooth peer devices.

A. five
B. eight
C. nine
D. four
Answer» C. nine
12.

Piconets in the blue tooth a minimum of two and a maximum of ____________ Bluetooth peer devices.

A. five
B. eight
C. nine
D. four
Answer» C. nine
13.

If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is .

A. 1 kbps
B. 1.25 kbps
C. 2 kbps
D. 10 kbps
Answer» E.
14.

If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is __________.

A. 1 kbps
B. 1.25 kbps
C. 2 kbps
D. 10 kbps
Answer» E.
15.

Which of the following TCP/IP protocol is used for transferringelectronic mail messages from one machine to another?

A. FTP
B. SNMP
C. SMTP
D. RPC
Answer» D. RPC
16.

What is the maximum size of data that the application layer can pass on to the TCP layer below?

A. Any size
B. 2^16 bytes-size of TCP header
C. 2^16 bytes
D. 1500 bytes
Answer» B. 2^16 bytes-size of TCP header
17.

Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?

A. FTP
B. SNMP
C. SMTP
D. RPC
Answer» D. RPC
18.

9 93. Determine the maximum length of the cable (in km) for transmitting data at a rate of 500 Mbps in an Ethernet LAN with frames of size 10,000 bits. Assume the signal speed in the cable to be 2,00,000 km/s.

A. 1
B. 2
C. 2.5
D. 5
Answer» C. 2.5
19.

In the slow start phase of the TCP congestion control algorithm, the size of the congestion window

A. does not increase
B. increases linearly
C. increases quadratically
D. increases exponentially
Answer» E.
20.

Which one of the following routing algorithm can be used for network layer design?

A. shortest path algorithm
B. distance vector routing
C. link state routing
D. all of the mentioned
Answer» E.
21.

Which of the following device is used to connect two systems, especiallyif the systems use different protocols?

A. hub
B. bridge
C. gateway
D. repeater
Answer» D. repeater
22.

Which of the following device is used to connect two systems, especially if the systems use different protocols?

A. hub
B. bridge
C. gateway
D. repeater
Answer» D. repeater
23.

What will be the efficiency of a Stop and Wait protocol, if the transmission time for a frame is 20ns and the propagation time is 30ns?

A. 20%
B. 25%
C. 40%
D. 66%
Answer» C. 40%
24.

can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits.

A. Hamming Code
B. CRC
C. VRC
D. None of the above
Answer» C. VRC
25.

_______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits.

A. Hamming Code
B. CRC
C. VRC
D. None of the above
Answer» C. VRC
26.

The communication mode that supports data in both directions at the same time is

A. simplex
B. half-duplex
C. full-duplex
D. multiplex
Answer» D. multiplex
27.

In OSI model, which of the following layer provides error-free delivery of data?

A. Data link
B. Network
C. transport
D. Session
Answer» D. Session
28.

A subset of a network that includes all the routers but contains no loops is called:

A. spanning tree
B. spider structure
C. spider tree
D. none of the mentioned
Answer» B. spider structure
29.

A subset of a network that includes all the routers but contains no loopsis called:

A. spanning tree
B. spider structure
C. spider tree
D. none of the mentioned
Answer» B. spider structure
30.

An endpoint of an inter-process communication flow across a computer network is called:

A. socket
B. pipe
C. port
D. none of the mentioned
Answer» B. pipe
31.

In serial data transmission, every byte of data is padded with a 0 in the beginning and one or two 1 s at the end of byte because

A. Receiver is to be synchronized for byte reception
B. Receiver recovers lost 0 and 1 s from these padded bits
C. Padded bits are useful in parity computation
D. None of these
Answer» B. Receiver recovers lost 0 and 1 s from these padded bits
32.

How many IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192?

A. 62
B. 126
C. 192
D. 254
Answer» B. 126
33.

A small network making up the Internet and also having a small numbers of computers within it is called

A. Host
B. Address
C. Subdomain
D. None of the above
Answer» D. None of the above
34.

The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard?

A. CSMA/CD
B. Token passing
C. Collision detection
D. Time sharing
Answer» C. Collision detection
35.

One of the header fields in an IP datagram is the Time to Live (TTL) field. Which of the following statements best explains the need for this field?

A. It can be used to prioritize packets
B. It can be used to reduce delays
C. It can be used to optimize throughput
D. It can be used to prevent packet looping
Answer» E.
36.

Message Oriented Middleware allows general purpose messages to be exchanged in a Client/Server system using message queues.

A. True
B. False
Answer» B. False