

MCQOPTIONS
Saved Bookmarks
This section includes 479 Mcqs, each offering curated multiple-choice questions to sharpen your Electrical Engineering knowledge and support exam preparation. Choose a topic below to get started.
251. |
In classful addressing, a large part of available addresses are ________ |
A. | organized |
B. | blocked |
C. | wasted |
D. | communicated |
Answer» D. communicated | |
252. |
First address in a block is used as network address that represents the ________ |
A. | class network |
B. | entity |
C. | organization |
D. | codes |
Answer» D. codes | |
253. |
In classless addressing, there are no classes but addresses are still granted in ______ |
A. | ips |
B. | blocks |
C. | codes |
D. | sizes |
Answer» C. codes | |
254. |
In IPv4 Addresses, classful addressing is replaced with ________ |
A. | classless addressing |
B. | classful addressing |
C. | classful advertising |
D. | classless advertising |
Answer» B. classful addressing | |
255. |
Which field helps to check rearrangement of the fragments? |
A. | offset |
B. | flag |
C. | ttl |
D. | identifier |
Answer» B. flag | |
256. |
Which of the following demerits does Fragmentation have? |
A. | complicates routers |
B. | open to dos attack |
C. | overlapping of fragments. |
D. | all of the mentioned |
Answer» E. | |
257. |
Which of these is not applicable for IP protocol? |
A. | is connectionless |
B. | offer reliable service |
C. | offer unreliable service |
D. | does not offer error reporting |
Answer» C. offer unreliable service | |
258. |
What should be the flag value to indicate the last fragment? |
A. | 0 |
B. | 1 |
C. | ttl value |
D. | protocol field value |
Answer» B. 1 | |
259. |
The data field cannot carry which of the following? |
A. | tcp segment |
B. | udp segment |
C. | icmp messages |
D. | smtp messages |
Answer» D. smtp messages | |
260. |
AJAX stands for _______ |
A. | asynchronous javascript and xml |
B. | advanced jsp and xml |
C. | asynchronous jsp and xml |
D. | advanced javascript and xml |
Answer» B. advanced jsp and xml | |
261. |
An alternative to JavaScript on windows platform is _______ |
A. | vbscript |
B. | asp.net |
C. | jsp |
D. | php |
Answer» B. asp.net | |
262. |
What is document object model (DOM)? |
A. | convention for representing and interacting with objects in html documents |
B. | application programming interface |
C. | hierarchy of objects in asp.net |
D. | scripting language |
Answer» B. application programming interface | |
263. |
Which one of the following is not used to generate dynamic web pages? |
A. | php |
B. | asp.net |
C. | jsp |
D. | css |
Answer» E. | |
264. |
URL stands for ________ |
A. | unique reference label |
B. | uniform reference label |
C. | uniform resource locator |
D. | unique resource locator |
Answer» D. unique resource locator | |
265. |
Common gateway interface is used to _______ |
A. | generate executable files from web content by web server |
B. | generate web pages |
C. | stream videos |
D. | download media files |
Answer» B. generate web pages | |
266. |
In frame relay networks, extended address is used ________ |
A. | to increase the range of data link connection identifiers |
B. | for error detection |
C. | for encryption |
D. | for error recovery |
Answer» B. for error detection | |
267. |
Frame relay has only _______ |
A. | physical layer |
B. | data link layer |
C. | physical layer and data link layer |
D. | network layer and data link layer |
Answer» D. network layer and data link layer | |
268. |
Virtual circuit identifier in frame relay is called _______ |
A. | data link connection identifier |
B. | frame relay identifier |
C. | cell relay identifier |
D. | circuit connection identifier |
Answer» B. frame relay identifier | |
269. |
Frame relay provides error detection at the ______ |
A. | physical layer |
B. | data link layer |
C. | network layer |
D. | transport layer |
Answer» C. network layer | |
270. |
Frame relay has _______ |
A. | only physical layer |
B. | only data link layer |
C. | only network layer |
D. | both physical and data link layer |
Answer» E. | |
271. |
Frame Relay networks offer an option called _______ |
A. | voice over for relay |
B. | voice over fine relay |
C. | voice on frame relay |
D. | voice over frame relay |
Answer» E. | |
272. |
What is FRAD in frame relay network? |
A. | frad assembles and disassembles the frames coming from other protocols |
B. | frad is used for modulation and demodulation |
C. | frad is used for error detection |
D. | frad is used for error recovery |
Answer» B. frad is used for modulation and demodulation | |
273. |
Frame Relay is cheaper than other _____ |
A. | lans |
B. | wans |
C. | mans |
D. | multipoint networks |
Answer» C. mans | |
274. |
In frame relay networks, extended address is used _______ |
A. | to increase the range of data link connection identifiers |
B. | for error detection |
C. | for encryption |
D. | for error recovery |
Answer» B. for error detection | |
275. |
Virtual circuit identifier in frame relay is called ______ |
A. | data link connection identifier |
B. | frame relay identifier |
C. | cell relay identifier |
D. | circuit connection identifier |
Answer» B. frame relay identifier | |
276. |
An ATM cell has the payload field of __________ |
A. | 32 bytes |
B. | 48 bytes |
C. | 64 bytes |
D. | 128 bytes |
Answer» C. 64 bytes | |
277. |
Frame relay has error detection at the ______ |
A. | physical layer |
B. | data link layer |
C. | network layer |
D. | transport layer |
Answer» C. network layer | |
278. |
ATM can be used for ________ |
A. | local area network |
B. | wide area network |
C. | campus area network |
D. | networks covering any range |
Answer» E. | |
279. |
ATM standard defines _______ layers. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» C. 4 | |
280. |
In data transfer phase, how many columns does the table contain? |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» E. | |
281. |
ATM and frame relay are ________ |
A. | virtual circuit networks |
B. | datagram networks |
C. | virtual private networks |
D. | virtual public networks |
Answer» B. datagram networks | |
282. |
Delay of the resource allocated during setup phase during data transfer is ________ |
A. | constant |
B. | increases for each packet |
C. | same for each packet |
D. | different for each packet |
Answer» D. different for each packet | |
283. |
Delay of the resource allocated on demand during data transfer is ________ |
A. | constant |
B. | increases for each packet |
C. | same for each packet |
D. | different for each packet |
Answer» E. | |
284. |
ATM uses _______________ |
A. | asynchronous frequency division multiplexing |
B. | asynchronous time division multiplexing |
C. | asynchronous space division multiplexing |
D. | asynchronous amplitude division multiplexing |
Answer» C. asynchronous space division multiplexing | |
285. |
Steps required in setup process are ___________ |
A. | setup request and acknowledgement |
B. | setup request and setup response |
C. | setup request and setup termination |
D. | setup and termination steps |
Answer» B. setup request and setup response | |
286. |
Which of the following is not a phase of virtual circuit network? |
A. | setup phase |
B. | data transfer phase |
C. | termination phase |
D. | teardown phase |
Answer» D. teardown phase | |
287. |
Which of the following is not a characteristic of Virtual Circuit Network? |
A. | there are setup and teardown phases in addition to the data transfer phase |
B. | resources can be allocated during setup phase or on demand |
C. | all packets follow the same path established during the connection |
D. | virtual circuit network is implemented in application layer |
Answer» E. | |
288. |
Backpressure technique can be applied only to _______ |
A. | congestion networks |
B. | closed circuit networks |
C. | open circuit networks |
D. | virtual circuit networks |
Answer» E. | |
289. |
Discarding policy is mainly done by _______ |
A. | sender |
B. | receiver |
C. | router |
D. | switch |
Answer» D. switch | |
290. |
In open-loop control, policies are applied to __________ |
A. | remove after congestion occurs |
B. | remove after sometime |
C. | prevent before congestion occurs |
D. | prevent before sending packets |
Answer» D. prevent before sending packets | |
291. |
Closed-Loop control mechanisms try to _________ |
A. | remove after congestion occurs |
B. | remove after sometime |
C. | prevent before congestion occurs |
D. | prevent before sending packets |
Answer» B. remove after sometime | |
292. |
ESP does not provide ________ |
A. | source authentication |
B. | data integrity |
C. | privacy |
D. | error control |
Answer» E. | |
293. |
IPsec defines two protocols: _______ and ________ |
A. | ah; ssl |
B. | pgp; esp |
C. | ah; esp |
D. | pgp; ssl |
Answer» D. pgp; ssl | |
294. |
The ______ field is used to detect errors over the entire user datagram. |
A. | udp header |
B. | checksum |
C. | source port |
D. | destination port |
Answer» C. source port | |
295. |
Which is the correct expression for the length of UDP datagram? |
A. | udp length = ip length – ip header’s length |
B. | udp length = udp length – udp header’s length |
C. | udp length = ip length + ip header’s length |
D. | udp length = udp length + udp header’s length |
Answer» B. udp length = udp length – udp header’s length | |
296. |
“Total length†field in UDP packet header is the length of _________ |
A. | only udp header |
B. | only data |
C. | only checksum |
D. | udp header plus data |
Answer» E. | |
297. |
What is the header size of a UDP packet? |
A. | 8 bytes |
B. | 8 bits |
C. | 16 bytes |
D. | 124 bytes |
Answer» B. 8 bits | |
298. |
Port number used by Network Time Protocol (NTP) with UDP is ________ |
A. | 161 |
B. | 123 |
C. | 162 |
D. | 124 |
Answer» C. 162 | |
299. |
The port number is “ephemeral port numberâ€, if the source host is _______ |
A. | ntp |
B. | echo |
C. | server |
D. | client |
Answer» E. | |
300. |
What is the main advantage of UDP? |
A. | more overload |
B. | reliable |
C. | low overhead |
D. | fast |
Answer» D. fast | |