Explore topic-wise MCQs in Computer Science.

This section includes 169 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.

1.

In ________ framing, we need a delimiter (flag) to define the boundary of two frames.

A. fixed-size
B. variable-size
C. standard
D. none of the above
Answer» C. standard
2.

A(n) _____ is a trusted third party that assigns a symmetric key to two parties.

A. KDC
B. CA
C. KDD
D. none of the above
Answer» B. CA
3.

If r is the number of data elements carried per signal element, N is the data rate, and S isthe signal rate, then

A. S= N x r
B. S = N/r
C. N = S x r x r
D. None of the above
Answer» C. N = S x r x r
4.

1 TeraHertz =

A. 1000000 Hz
B. 1000000000 Hz
C. 1000000000000 Hz
D. None of the above
Answer» D. None of the above
5.

Which of the following functions does UDP perform?

A. process-to-process communication
B. host-to-host communication
C. end-to-end reliable data delivery
D. none of the above
Answer» B. host-to-host communication
6.

Transport layer aggregates data from different applications into a single stream beforepassing it to

A. network layer
B. data link layer
C. application layer
D. physical layer
Answer» B. data link layer
7.

_________ means that a sender must not be able to deny sending a message that he sent.

A. Confidentiality
B. Integrity
C. Authentication
D. Non-repudiation
Answer» E.
8.

______ control refers to methods of error detection and correction.

A. Flow
B. Error
C. Transmission
D. None of the above
Answer» C. Transmission
9.

Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the ______.

A. header
B. trailer
C. flag
D. none of the above
Answer» D. none of the above
10.

UDP and TCP are both _______ layer protocols.

A. data link
B. network
C. transport
D. none of the above
Answer» D. none of the above
11.

In _________ protocols, we use ________.

A. character-oriented; byte stuffing
B. character-oriented; bit stuffing
C. bit-oriented; character stuffing
D. none of the above
Answer» B. character-oriented; bit stuffing
12.

Multi-destination routing

A. is same as broadcast routing
B. contains the list of all destinations
C. data is not sent by packets
D. none of the above
Answer» D. none of the above
13.

Bit stuffing means adding an extra 0 to the data section of the frame when there is asequence of bits with the same pattern as the ________.

A. Header
B. Trailer
C. Flag
D. None of the above
Answer» D. None of the above
14.

Dialog control is the function of which layer

A. Transport
B. Session
C. Presentation
D. Application
Answer» C. Presentation
15.

In the sending computer, UDP sends a data unit to the _______ layer.

A. application
B. transport
C. IP
D. none of the above
Answer» D. none of the above
16.

Data unit is called a frame in

A. Physical layer
B. Network layer
C. Presentation layer
D. Data link layer
Answer» E.
17.

Which is also known as a connectionless protocol for a packet-switching network thatuses the Datagram approach?

A. IPV5
B. IPV4
C. IPV6
D. None of these
Answer» C. IPV6
18.

The _____________ translates internet domain and host names to IP address.

A. domain name system
B. routing information protocol
C. network time protocol
D. internet relay chat
Answer» B. routing information protocol
19.

The sender is a router that has received a datagram destined for a host on another network. The logical address that must be mapped to a physical address is ______.

A. the destination IP address in the datagram header
B. the IP address of the router found in the routing table
C. either a or b
D. none of the above
Answer» C. either a or b
20.

The local host and the remote host are defined using IP addresses. To define theprocesses, we need second identifiers called ____________.

A. UDP addresses
B. transport addresses
C. port addresses
D. none of the above
Answer» D. none of the above
21.

Which organization has authority over interstate and international commerce in thecommunications field?

A. ITU-T
B. IEEE
C. FCC
D. ISOC
Answer» D. ISOC
22.

_______ are special-interest groups that quickly test, evaluate, and standardize newtechnologies.

A. Forums
B. Regulatory agencies
C. Standards organizations
D. All of the above
Answer» B. Regulatory agencies
23.

Layer 2 from bottom in TCP/IP is the ___________.

A. Physical layer
B. Application layer
C. Transport layer
D. Internet layer
Answer» E.
24.

Which agency developed standards for physical connection interfaces and electronicsignaling specifications?

A. EIA
B. ITU-T
C. ANSI
D. ISO
Answer» B. ITU-T
25.

An ARP request is normally _______.

A. broadcast
B. multicast
C. unicast
D. none of the above
Answer» B. multicast
26.

The idea of address aggregation was designed to alleviate the increase in routing tableentries when using ________.

A. classful addressing
B. classless addressing
C. both a and b
D. none of the above
Answer» C. both a and b
27.

Substitutional cipers are

A. Monoalphabatic
B. Sami alphabetic
C. polyalphabetic
D. both a and c
Answer» E.
28.

_______ control refers to a set of procedures used to restrict the amount of data that thesender can send before waiting for acknowledgment.

A. Flow
B. Error
C. Transmission
D. None of the above
Answer» B. Error
29.

_______ refers to two characteristics: when data should be sent and how fast it can besent.

A. Semantics
B. Syntax
C. Timing
D. none of the above
Answer» D. none of the above
30.

_________framing uses two categories of protocols: character-oriented and bit-oriented.

A. Fixed-size
B. Variable-size
C. Standard
D. None of the above
Answer» C. Standard
31.

The _____of errors is more difficult than the ______.

A. correction; detection
B. detection; correction
C. creation; correction
D. creation; detection
Answer» B. detection; correction
32.

In _______ framing, there is no need for defining the boundaries of frames.

A. fixed-size
B. variable-size
C. standard
D. none of the above
Answer» B. variable-size
33.

Although there are several ways to achieve process-to-process communication, the mostcommon is through the __________ paradigm.

A. client-server
B. client-client
C. server-server
D. none of the above
Answer» B. client-client
34.

________ means to prove the identity of the entity that tries to access the system'sresources.

A. Message authentication
B. Entity authentication
C. Message confidentiality
D. none of the above
Answer» C. Message confidentiality
35.

A ________ is a local address. Its jurisdiction is over a local network.

A. physical
B. logical
C. a and b
D. none of the above
Answer» B. logical
36.

Data link control deals with the design and procedures for ______ communication.

A. node-to-node
B. host-to-host
C. process-to-process
D. none of the above
Answer» B. host-to-host
37.

In a _________ protocol, the data section of a frame is a sequence of bits.

A. byte-oriented
B. bit-oriented
C. either (a) or (b)
D. none of the above
Answer» C. either (a) or (b)
38.

When 2 or more bits in a data unit has been changed during the transmission, the error iscalled

A. random error
B. burst error
C. inverted error
D. none
Answer» C. inverted error
39.

In Go-Back-N ARQ, if frames 4, 5, and 6 are received successfully, the receiver may send an ACK _______ to the sender.

A. 5
B. 6
C. 7
D. any of the above
Answer» D. any of the above
40.

IP makes a __________ of datagram delivery.

A. worst effort
B. guaranteed delivery
C. best effort
D. all of the above
Answer» D. all of the above
41.

NRZ L and NRZ I differ in

A. synchronization
B. transition
C. Both a and b
D. None
Answer» D. None
42.

_______codes are special linear block codes with one extra property. If a codeword isrotated, the result is another codeword.

A. Non-linear
B. Convolution
C. Cyclic
D. none of the above
Answer» D. none of the above
43.

For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are needed.

A. exactly 10
B. less than 10
C. more than 10
D. none of the above
Answer» B. less than 10
44.

In _______ forwarding, the mask and destination addresses are both 0.0.0.0 in the routing table.

A. next-hop
B. network-specific
C. host-specific
D. default
Answer» E.
45.

Man-in-the-middle attack can endanger security of Diffie-Hellman method if two parties are not

A. Authenticated
B. Joined
C. Submit
D. Separate
Answer» B. Joined
46.

The information to be communicated in a data communication system is

A. Medium
B. Protocol
C. Message
D. Transmission
Answer» D. Transmission
47.

Ethernet uses a ______ physical address that is imprinted on the network interface card(NIC).

A. 32-bit
B. 64-bit
C. 6-byte
D. none of the above
Answer» D. none of the above
48.

QAM combines

A. ASK and FSK
B. FSK and PSK
C. ASK and PSK
D. None of the above
Answer» D. None of the above
49.

When a packet is lost in transit, it should be handled by _____________.

A. Sequence control
B. Loss control
C. Error control
D. Duplication control
Answer» B. Loss control
50.

The ________ address, also known as the link address, is the address of a node as definedby its LAN or WAN.

A. port
B. physical
C. logical
D. none of the above
Answer» C. logical