MCQOPTIONS
Saved Bookmarks
This section includes 169 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
The_________ layer is responsible for the delivery of a message from one process toanother. |
| A. | physical |
| B. | transport |
| C. | network |
| D. | none of the above |
| Answer» C. network | |
| 52. |
Shift cipher is sometimes referred to as the |
| A. | Caesar cipher |
| B. | Shift cipher |
| C. | cipher |
| D. | cipher text |
| Answer» B. Shift cipher | |
| 53. |
Which sublayer of the data link layer performs data link functions that depend upon thetype of medium? |
| A. | logical link control sublayer |
| B. | media access control sublayer |
| C. | network interface control sublayer |
| D. | none of the above |
| Answer» C. network interface control sublayer | |
| 54. |
The ports ranging from 49,152 to 65,535 can be used as temporary or private portnumbers. They are called the ________ ports. |
| A. | well-known |
| B. | registered |
| C. | dynamic |
| D. | none of the above |
| Answer» D. none of the above | |
| 55. |
Packets in IPv4 layer are called |
| A. | datagrams |
| B. | header length |
| C. | code point |
| D. | tunneling |
| Answer» B. header length | |
| 56. |
In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers? |
| A. | 0 to 63 |
| B. | 0 to 64 |
| C. | 1 to 63 |
| D. | 1 to 64 |
| Answer» B. 0 to 64 | |
| 57. |
The OSI model consist of |
| A. | 3 layers |
| B. | 5 layers |
| C. | 7 layers |
| D. | 8 layers |
| Answer» D. 8 layers | |
| 58. |
Which topology features a point to point line configuration |
| A. | Mesh |
| B. | Star |
| C. | Ring |
| D. | All of above |
| Answer» E. | |
| 59. |
The sender is a router that has received a datagram destined for a host on the same network. The logical address that must be mapped to a physical address is ______. |
| A. | the destination IP address in the datagram header |
| B. | the IP address of the router found in the routing table |
| C. | either a or b |
| D. | none of the above |
| Answer» B. the IP address of the router found in the routing table | |
| 60. |
When the IP layer of a receiving host receives a datagram, _______. |
| A. | delivery is complete |
| B. | a transport layer protocol takes over |
| C. | a header is added |
| D. | none of the above |
| Answer» C. a header is added | |
| 61. |
A port address in UDP is _______bits long. |
| A. | 8 |
| B. | 16 |
| C. | 32 |
| D. | any of the above |
| Answer» C. 32 | |
| 62. |
Which of the following does UDP guarantee? |
| A. | flow control |
| B. | connection-oriented delivery |
| C. | flow control |
| D. | none of the above |
| Answer» E. | |
| 63. |
ARQ stands for _______. |
| A. | Automatic repeat quantization |
| B. | Automatic repeat request |
| C. | Automatic retransmission request |
| D. | Acknowledge repeat request |
| Answer» C. Automatic retransmission request | |
| 64. |
_______ in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. |
| A. | Digitizing |
| B. | Controlling |
| C. | Framing |
| D. | none of the above |
| Answer» D. none of the above | |
| 65. |
HDLC is an acronym for _______. |
| A. | High-duplex line communication |
| B. | High-level data link control |
| C. | Half-duplex digital link combination |
| D. | Host double-level circuit |
| Answer» C. Half-duplex digital link combination | |
| 66. |
Rules that govern a communication exchange are |
| A. | Media |
| B. | Criteria |
| C. | Protocol |
| D. | All of above |
| Answer» D. All of above | |
| 67. |
Heart of Data Encryption Standard (DES), is the |
| A. | Cipher |
| B. | Rounds |
| C. | Encryption |
| D. | DES function |
| Answer» E. | |
| 68. |
In sliding window, if the window size is 63, what is the range of sequence numbers? |
| A. | 0 to 63 |
| B. | 0 to 64 |
| C. | 1 to 63 |
| D. | 1 to 64 |
| Answer» B. 0 to 64 | |
| 69. |
The data link layer takes the packets from _____ and encapsulates them into frames fortransmission. |
| A. | network layer |
| B. | physical layer |
| C. | transport layer |
| D. | application layer |
| Answer» B. physical layer | |
| 70. |
UDP needs the _______ address to deliver the user datagram to the correct applicationprocess. |
| A. | port |
| B. | application |
| C. | internet |
| D. | none of the above |
| Answer» B. application | |
| 71. |
_______ refers to the structure or format of the data, meaning the order in which they arepresented. |
| A. | Semantics |
| B. | Syntax |
| C. | Timing |
| D. | All of the above |
| Answer» C. Timing | |
| 72. |
In _______ transmission, the channel capacity is shared by both communicating devicesat all times. |
| A. | simplex |
| B. | half-duplex |
| C. | full-duplex |
| D. | half-simplex |
| Answer» D. half-simplex | |
| 73. |
When a primary device wants to send data to a secondary device, it needs to first send _______ frame. |
| A. | ACK |
| B. | Poll |
| C. | SEL |
| D. | ENQ |
| Answer» E. | |
| 74. |
________ defines how a particular pattern to be interpreted, and what action is to betaken based on that interpretation. |
| A. | Semantics |
| B. | Syntax |
| C. | Timing |
| D. | None of the above |
| Answer» B. Syntax | |
| 75. |
UDP does not add anything to the services of IP except for providing _______communication. |
| A. | node-to-node |
| B. | process-to-process |
| C. | host-to-host |
| D. | none of the above |
| Answer» C. host-to-host | |
| 76. |
This was the first network. |
| A. | CSNET |
| B. | NSFNET |
| C. | ANSNET |
| D. | ARPANET |
| Answer» E. | |
| 77. |
_______________is a reliable delivery mechanism. |
| A. | IP |
| B. | TCP |
| C. | UDP |
| D. | ARP |
| Answer» C. UDP | |
| 78. |
In _______ forwarding, the routing table holds the address of just the next hop instead of complete route information. |
| A. | next-hop |
| B. | network-specific |
| C. | host-specific |
| D. | default |
| Answer» B. network-specific | |
| 79. |
In a network with 25 computers, which topology would require most extensive calling |
| A. | Mesh |
| B. | Star |
| C. | Bus |
| D. | Ring |
| Answer» B. Star | |
| 80. |
In a ________ protocol, the data section of a frame is a sequence of characters. |
| A. | bit-oriented |
| B. | character-oriented |
| C. | either (a) or (b) |
| D. | none of the above |
| Answer» C. either (a) or (b) | |
| 81. |
Transport layer is _____________ the data link layer. |
| A. | Above |
| B. | Below |
| C. | Depended on |
| D. | None of the above |
| Answer» B. Below | |
| 82. |
In modulo-2 arithmetic, we use only ______. |
| A. | 1 and 2 |
| B. | 0 and 2 |
| C. | 0 and 1 |
| D. | none of the above |
| Answer» D. none of the above | |
| 83. |
In the sending computer, UDP receives a data unit from the _______ layer. |
| A. | application |
| B. | transport |
| C. | IP |
| D. | none of the above |
| Answer» B. transport | |
| 84. |
Differential Manchester and multi line transmission (MLT-3) schemes differ in |
| A. | Number of transition rules to encode binary data |
| B. | Self synchronization |
| C. | Both a and b |
| D. | None of the above |
| Answer» D. None of the above | |
| 85. |
If the sender is a host and wants to send a packet to another host on the same network, the logical address that must be mapped to a physical address is ______. |
| A. | the destination IP address in the datagram header |
| B. | the IP address of the router found in the routing table |
| C. | either a or b |
| D. | none of the above |
| Answer» B. the IP address of the router found in the routing table | |
| 86. |
Message _______ means that the receiver is ensured that the message is coming from theintended sender, not an imposter. |
| A. | confidentiality |
| B. | integrity |
| C. | authentication |
| D. | none of the above |
| Answer» D. none of the above | |
| 87. |
The principle of ________ states that the routing table is sorted from the longest mask tothe shortest mask. |
| A. | first mask matching |
| B. | shortest mask matching |
| C. | longest mask matching |
| D. | none of the above |
| Answer» D. none of the above | |
| 88. |
Communication between a computer and a keyboard involves ______________transmission. |
| A. | simplex |
| B. | half-duplex |
| C. | full-duplex |
| D. | automatic |
| Answer» B. half-duplex | |
| 89. |
An ARP reply is normally _______. |
| A. | broadcast |
| B. | multicast |
| C. | unicast |
| D. | none of the above |
| Answer» D. none of the above | |
| 90. |
The PDU of network layer is |
| A. | bits |
| B. | frames |
| C. | packets |
| D. | none |
| Answer» D. none | |
| 91. |
A technique called ______ is used to create a subnetting effect. |
| A. | ARP |
| B. | RARP |
| C. | proxy ARP |
| D. | none of the above |
| Answer» D. none of the above | |
| 92. |
UDP is called a ________________transport protocol. |
| A. | connectionless, reliable |
| B. | connection-oriented, unreliable |
| C. | connectionless, unreliable |
| D. | none of the above |
| Answer» D. none of the above | |
| 93. |
In ________ protocols, we use ________. |
| A. | byte-oriented; bit stuffing |
| B. | character-oriented; bit stuffing |
| C. | bit-oriented; bit stuffing |
| D. | none of the above |
| Answer» D. none of the above | |
| 94. |
If the sender is a host and wants to send a packet to another host on another network, the logical address that must be mapped to a physical address is ______. |
| A. | the destination IP address in the datagram header |
| B. | the IP address of the router found in the routing table |
| C. | either a or b |
| D. | none of the above |
| Answer» C. either a or b | |
| 95. |
A(n) ________function creates a message digest out of a message. |
| A. | encryption |
| B. | decryption |
| C. | hash |
| D. | none of the above |
| Answer» D. none of the above | |
| 96. |
In a linear block code, the _______ of any two valid codewords creates another valid codeword |
| A. | XORing |
| B. | ORing |
| C. | ANDing |
| D. | none of the above |
| Answer» B. ORing | |
| 97. |
Subnetting is actually |
| A. | collection of networks |
| B. | sub division of networks |
| C. | one sub network |
| D. | None |
| Answer» C. one sub network | |
| 98. |
UDP is an acronym for _______. |
| A. | User Delivery Protocol |
| B. | User Datagram Procedure |
| C. | User Datagram Protocol |
| D. | None of the above |
| Answer» D. None of the above | |
| 99. |
In modulo-11 arithmetic, we use only the integers in the range ______, inclusive. |
| A. | 1 to 10 |
| B. | 1 to 11 |
| C. | 0 to 10 |
| D. | none of the above |
| Answer» D. none of the above | |
| 100. |
Performance of data communications depend on |
| A. | No. of users |
| B. | Transmission media |
| C. | H/w and S/w |
| D. | All of above |
| Answer» E. | |