Explore topic-wise MCQs in Electrical Engineering.

This section includes 479 Mcqs, each offering curated multiple-choice questions to sharpen your Electrical Engineering knowledge and support exam preparation. Choose a topic below to get started.

251.

In classful addressing, a large part of available addresses are ________

A. organized
B. blocked
C. wasted
D. communicated
Answer» D. communicated
252.

First address in a block is used as network address that represents the ________

A. class network
B. entity
C. organization
D. codes
Answer» D. codes
253.

In classless addressing, there are no classes but addresses are still granted in ______

A. ips
B. blocks
C. codes
D. sizes
Answer» C. codes
254.

In IPv4 Addresses, classful addressing is replaced with ________

A. classless addressing
B. classful addressing
C. classful advertising
D. classless advertising
Answer» B. classful addressing
255.

Which field helps to check rearrangement of the fragments?

A. offset
B. flag
C. ttl
D. identifier
Answer» B. flag
256.

Which of the following demerits does Fragmentation have?

A. complicates routers
B. open to dos attack
C. overlapping of fragments.
D. all of the mentioned
Answer» E.
257.

Which of these is not applicable for IP protocol?

A. is connectionless
B. offer reliable service
C. offer unreliable service
D. does not offer error reporting
Answer» C. offer unreliable service
258.

What should be the flag value to indicate the last fragment?

A. 0
B. 1
C. ttl value
D. protocol field value
Answer» B. 1
259.

The data field cannot carry which of the following?

A. tcp segment
B. udp segment
C. icmp messages
D. smtp messages
Answer» D. smtp messages
260.

AJAX stands for _______

A. asynchronous javascript and xml
B. advanced jsp and xml
C. asynchronous jsp and xml
D. advanced javascript and xml
Answer» B. advanced jsp and xml
261.

An alternative to JavaScript on windows platform is _______

A. vbscript
B. asp.net
C. jsp
D. php
Answer» B. asp.net
262.

What is document object model (DOM)?

A. convention for representing and interacting with objects in html documents
B. application programming interface
C. hierarchy of objects in asp.net
D. scripting language
Answer» B. application programming interface
263.

Which one of the following is not used to generate dynamic web pages?

A. php
B. asp.net
C. jsp
D. css
Answer» E.
264.

URL stands for ________

A. unique reference label
B. uniform reference label
C. uniform resource locator
D. unique resource locator
Answer» D. unique resource locator
265.

Common gateway interface is used to _______

A. generate executable files from web content by web server
B. generate web pages
C. stream videos
D. download media files
Answer» B. generate web pages
266.

In frame relay networks, extended address is used ________

A. to increase the range of data link connection identifiers
B. for error detection
C. for encryption
D. for error recovery
Answer» B. for error detection
267.

Frame relay has only _______

A. physical layer
B. data link layer
C. physical layer and data link layer
D. network layer and data link layer
Answer» D. network layer and data link layer
268.

Virtual circuit identifier in frame relay is called _______

A. data link connection identifier
B. frame relay identifier
C. cell relay identifier
D. circuit connection identifier
Answer» B. frame relay identifier
269.

Frame relay provides error detection at the ______

A. physical layer
B. data link layer
C. network layer
D. transport layer
Answer» C. network layer
270.

Frame relay has _______

A. only physical layer
B. only data link layer
C. only network layer
D. both physical and data link layer
Answer» E.
271.

Frame Relay networks offer an option called _______

A. voice over for relay
B. voice over fine relay
C. voice on frame relay
D. voice over frame relay
Answer» E.
272.

What is FRAD in frame relay network?

A. frad assembles and disassembles the frames coming from other protocols
B. frad is used for modulation and demodulation
C. frad is used for error detection
D. frad is used for error recovery
Answer» B. frad is used for modulation and demodulation
273.

Frame Relay is cheaper than other _____

A. lans
B. wans
C. mans
D. multipoint networks
Answer» C. mans
274.

In frame relay networks, extended address is used _______

A. to increase the range of data link connection identifiers
B. for error detection
C. for encryption
D. for error recovery
Answer» B. for error detection
275.

Virtual circuit identifier in frame relay is called ______

A. data link connection identifier
B. frame relay identifier
C. cell relay identifier
D. circuit connection identifier
Answer» B. frame relay identifier
276.

An ATM cell has the payload field of __________

A. 32 bytes
B. 48 bytes
C. 64 bytes
D. 128 bytes
Answer» C. 64 bytes
277.

Frame relay has error detection at the ______

A. physical layer
B. data link layer
C. network layer
D. transport layer
Answer» C. network layer
278.

ATM can be used for ________

A. local area network
B. wide area network
C. campus area network
D. networks covering any range
Answer» E.
279.

ATM standard defines _______ layers.

A. 2
B. 3
C. 4
D. 5
Answer» C. 4
280.

In data transfer phase, how many columns does the table contain?

A. 1
B. 2
C. 3
D. 4
Answer» E.
281.

ATM and frame relay are ________

A. virtual circuit networks
B. datagram networks
C. virtual private networks
D. virtual public networks
Answer» B. datagram networks
282.

Delay of the resource allocated during setup phase during data transfer is ________

A. constant
B. increases for each packet
C. same for each packet
D. different for each packet
Answer» D. different for each packet
283.

Delay of the resource allocated on demand during data transfer is ________

A. constant
B. increases for each packet
C. same for each packet
D. different for each packet
Answer» E.
284.

ATM uses _______________

A. asynchronous frequency division multiplexing
B. asynchronous time division multiplexing
C. asynchronous space division multiplexing
D. asynchronous amplitude division multiplexing
Answer» C. asynchronous space division multiplexing
285.

Steps required in setup process are ___________

A. setup request and acknowledgement
B. setup request and setup response
C. setup request and setup termination
D. setup and termination steps
Answer» B. setup request and setup response
286.

Which of the following is not a phase of virtual circuit network?

A. setup phase
B. data transfer phase
C. termination phase
D. teardown phase
Answer» D. teardown phase
287.

Which of the following is not a characteristic of Virtual Circuit Network?

A. there are setup and teardown phases in addition to the data transfer phase
B. resources can be allocated during setup phase or on demand
C. all packets follow the same path established during the connection
D. virtual circuit network is implemented in application layer
Answer» E.
288.

Backpressure technique can be applied only to _______

A. congestion networks
B. closed circuit networks
C. open circuit networks
D. virtual circuit networks
Answer» E.
289.

Discarding policy is mainly done by _______

A. sender
B. receiver
C. router
D. switch
Answer» D. switch
290.

In open-loop control, policies are applied to __________

A. remove after congestion occurs
B. remove after sometime
C. prevent before congestion occurs
D. prevent before sending packets
Answer» D. prevent before sending packets
291.

Closed-Loop control mechanisms try to _________

A. remove after congestion occurs
B. remove after sometime
C. prevent before congestion occurs
D. prevent before sending packets
Answer» B. remove after sometime
292.

ESP does not provide ________

A. source authentication
B. data integrity
C. privacy
D. error control
Answer» E.
293.

IPsec defines two protocols: _______ and ________

A. ah; ssl
B. pgp; esp
C. ah; esp
D. pgp; ssl
Answer» D. pgp; ssl
294.

The ______ field is used to detect errors over the entire user datagram.

A. udp header
B. checksum
C. source port
D. destination port
Answer» C. source port
295.

Which is the correct expression for the length of UDP datagram?

A. udp length = ip length – ip header’s length
B. udp length = udp length – udp header’s length
C. udp length = ip length + ip header’s length
D. udp length = udp length + udp header’s length
Answer» B. udp length = udp length – udp header’s length
296.

“Total length” field in UDP packet header is the length of _________

A. only udp header
B. only data
C. only checksum
D. udp header plus data
Answer» E.
297.

What is the header size of a UDP packet?

A. 8 bytes
B. 8 bits
C. 16 bytes
D. 124 bytes
Answer» B. 8 bits
298.

Port number used by Network Time Protocol (NTP) with UDP is ________

A. 161
B. 123
C. 162
D. 124
Answer» C. 162
299.

The port number is “ephemeral port number”, if the source host is _______

A. ntp
B. echo
C. server
D. client
Answer» E.
300.

What is the main advantage of UDP?

A. more overload
B. reliable
C. low overhead
D. fast
Answer» D. fast