Explore topic-wise MCQs in Computer Science.

This section includes 169 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.

51.

The_________ layer is responsible for the delivery of a message from one process toanother.

A. physical
B. transport
C. network
D. none of the above
Answer» C. network
52.

Shift cipher is sometimes referred to as the

A. Caesar cipher
B. Shift cipher
C. cipher
D. cipher text
Answer» B. Shift cipher
53.

Which sublayer of the data link layer performs data link functions that depend upon thetype of medium?

A. logical link control sublayer
B. media access control sublayer
C. network interface control sublayer
D. none of the above
Answer» C. network interface control sublayer
54.

The ports ranging from 49,152 to 65,535 can be used as temporary or private portnumbers. They are called the ________ ports.

A. well-known
B. registered
C. dynamic
D. none of the above
Answer» D. none of the above
55.

Packets in IPv4 layer are called

A. datagrams
B. header length
C. code point
D. tunneling
Answer» B. header length
56.

In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers?

A. 0 to 63
B. 0 to 64
C. 1 to 63
D. 1 to 64
Answer» B. 0 to 64
57.

The OSI model consist of

A. 3 layers
B. 5 layers
C. 7 layers
D. 8 layers
Answer» D. 8 layers
58.

Which topology features a point to point line configuration

A. Mesh
B. Star
C. Ring
D. All of above
Answer» E.
59.

The sender is a router that has received a datagram destined for a host on the same network. The logical address that must be mapped to a physical address is ______.

A. the destination IP address in the datagram header
B. the IP address of the router found in the routing table
C. either a or b
D. none of the above
Answer» B. the IP address of the router found in the routing table
60.

When the IP layer of a receiving host receives a datagram, _______.

A. delivery is complete
B. a transport layer protocol takes over
C. a header is added
D. none of the above
Answer» C. a header is added
61.

A port address in UDP is _______bits long.

A. 8
B. 16
C. 32
D. any of the above
Answer» C. 32
62.

Which of the following does UDP guarantee?

A. flow control
B. connection-oriented delivery
C. flow control
D. none of the above
Answer» E.
63.

ARQ stands for _______.

A. Automatic repeat quantization
B. Automatic repeat request
C. Automatic retransmission request
D. Acknowledge repeat request
Answer» C. Automatic retransmission request
64.

_______ in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations.

A. Digitizing
B. Controlling
C. Framing
D. none of the above
Answer» D. none of the above
65.

HDLC is an acronym for _______.

A. High-duplex line communication
B. High-level data link control
C. Half-duplex digital link combination
D. Host double-level circuit
Answer» C. Half-duplex digital link combination
66.

Rules that govern a communication exchange are

A. Media
B. Criteria
C. Protocol
D. All of above
Answer» D. All of above
67.

Heart of Data Encryption Standard (DES), is the

A. Cipher
B. Rounds
C. Encryption
D. DES function
Answer» E.
68.

In sliding window, if the window size is 63, what is the range of sequence numbers?

A. 0 to 63
B. 0 to 64
C. 1 to 63
D. 1 to 64
Answer» B. 0 to 64
69.

The data link layer takes the packets from _____ and encapsulates them into frames fortransmission.

A. network layer
B. physical layer
C. transport layer
D. application layer
Answer» B. physical layer
70.

UDP needs the _______ address to deliver the user datagram to the correct applicationprocess.

A. port
B. application
C. internet
D. none of the above
Answer» B. application
71.

_______ refers to the structure or format of the data, meaning the order in which they arepresented.

A. Semantics
B. Syntax
C. Timing
D. All of the above
Answer» C. Timing
72.

In _______ transmission, the channel capacity is shared by both communicating devicesat all times.

A. simplex
B. half-duplex
C. full-duplex
D. half-simplex
Answer» D. half-simplex
73.

When a primary device wants to send data to a secondary device, it needs to first send _______ frame.

A. ACK
B. Poll
C. SEL
D. ENQ
Answer» E.
74.

________ defines how a particular pattern to be interpreted, and what action is to betaken based on that interpretation.

A. Semantics
B. Syntax
C. Timing
D. None of the above
Answer» B. Syntax
75.

UDP does not add anything to the services of IP except for providing _______communication.

A. node-to-node
B. process-to-process
C. host-to-host
D. none of the above
Answer» C. host-to-host
76.

This was the first network.

A. CSNET
B. NSFNET
C. ANSNET
D. ARPANET
Answer» E.
77.

_______________is a reliable delivery mechanism.

A. IP
B. TCP
C. UDP
D. ARP
Answer» C. UDP
78.

In _______ forwarding, the routing table holds the address of just the next hop instead of complete route information.

A. next-hop
B. network-specific
C. host-specific
D. default
Answer» B. network-specific
79.

In a network with 25 computers, which topology would require most extensive calling

A. Mesh
B. Star
C. Bus
D. Ring
Answer» B. Star
80.

In a ________ protocol, the data section of a frame is a sequence of characters.

A. bit-oriented
B. character-oriented
C. either (a) or (b)
D. none of the above
Answer» C. either (a) or (b)
81.

Transport layer is _____________ the data link layer.

A. Above
B. Below
C. Depended on
D. None of the above
Answer» B. Below
82.

In modulo-2 arithmetic, we use only ______.

A. 1 and 2
B. 0 and 2
C. 0 and 1
D. none of the above
Answer» D. none of the above
83.

In the sending computer, UDP receives a data unit from the _______ layer.

A. application
B. transport
C. IP
D. none of the above
Answer» B. transport
84.

Differential Manchester and multi line transmission (MLT-3) schemes differ in

A. Number of transition rules to encode binary data
B. Self synchronization
C. Both a and b
D. None of the above
Answer» D. None of the above
85.

If the sender is a host and wants to send a packet to another host on the same network, the logical address that must be mapped to a physical address is ______.

A. the destination IP address in the datagram header
B. the IP address of the router found in the routing table
C. either a or b
D. none of the above
Answer» B. the IP address of the router found in the routing table
86.

Message _______ means that the receiver is ensured that the message is coming from theintended sender, not an imposter.

A. confidentiality
B. integrity
C. authentication
D. none of the above
Answer» D. none of the above
87.

The principle of ________ states that the routing table is sorted from the longest mask tothe shortest mask.

A. first mask matching
B. shortest mask matching
C. longest mask matching
D. none of the above
Answer» D. none of the above
88.

Communication between a computer and a keyboard involves ______________transmission.

A. simplex
B. half-duplex
C. full-duplex
D. automatic
Answer» B. half-duplex
89.

An ARP reply is normally _______.

A. broadcast
B. multicast
C. unicast
D. none of the above
Answer» D. none of the above
90.

The PDU of network layer is

A. bits
B. frames
C. packets
D. none
Answer» D. none
91.

A technique called ______ is used to create a subnetting effect.

A. ARP
B. RARP
C. proxy ARP
D. none of the above
Answer» D. none of the above
92.

UDP is called a ________________transport protocol.

A. connectionless, reliable
B. connection-oriented, unreliable
C. connectionless, unreliable
D. none of the above
Answer» D. none of the above
93.

In ________ protocols, we use ________.

A. byte-oriented; bit stuffing
B. character-oriented; bit stuffing
C. bit-oriented; bit stuffing
D. none of the above
Answer» D. none of the above
94.

If the sender is a host and wants to send a packet to another host on another network, the logical address that must be mapped to a physical address is ______.

A. the destination IP address in the datagram header
B. the IP address of the router found in the routing table
C. either a or b
D. none of the above
Answer» C. either a or b
95.

A(n) ________function creates a message digest out of a message.

A. encryption
B. decryption
C. hash
D. none of the above
Answer» D. none of the above
96.

In a linear block code, the _______ of any two valid codewords creates another valid codeword

A. XORing
B. ORing
C. ANDing
D. none of the above
Answer» B. ORing
97.

Subnetting is actually

A. collection of networks
B. sub division of networks
C. one sub network
D. None
Answer» C. one sub network
98.

UDP is an acronym for _______.

A. User Delivery Protocol
B. User Datagram Procedure
C. User Datagram Protocol
D. None of the above
Answer» D. None of the above
99.

In modulo-11 arithmetic, we use only the integers in the range ______, inclusive.

A. 1 to 10
B. 1 to 11
C. 0 to 10
D. none of the above
Answer» D. none of the above
100.

Performance of data communications depend on

A. No. of users
B. Transmission media
C. H/w and S/w
D. All of above
Answer» E.