

MCQOPTIONS
Saved Bookmarks
This section includes 169 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
51. |
The_________ layer is responsible for the delivery of a message from one process toanother. |
A. | physical |
B. | transport |
C. | network |
D. | none of the above |
Answer» C. network | |
52. |
Shift cipher is sometimes referred to as the |
A. | Caesar cipher |
B. | Shift cipher |
C. | cipher |
D. | cipher text |
Answer» B. Shift cipher | |
53. |
Which sublayer of the data link layer performs data link functions that depend upon thetype of medium? |
A. | logical link control sublayer |
B. | media access control sublayer |
C. | network interface control sublayer |
D. | none of the above |
Answer» C. network interface control sublayer | |
54. |
The ports ranging from 49,152 to 65,535 can be used as temporary or private portnumbers. They are called the ________ ports. |
A. | well-known |
B. | registered |
C. | dynamic |
D. | none of the above |
Answer» D. none of the above | |
55. |
Packets in IPv4 layer are called |
A. | datagrams |
B. | header length |
C. | code point |
D. | tunneling |
Answer» B. header length | |
56. |
In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers? |
A. | 0 to 63 |
B. | 0 to 64 |
C. | 1 to 63 |
D. | 1 to 64 |
Answer» B. 0 to 64 | |
57. |
The OSI model consist of |
A. | 3 layers |
B. | 5 layers |
C. | 7 layers |
D. | 8 layers |
Answer» D. 8 layers | |
58. |
Which topology features a point to point line configuration |
A. | Mesh |
B. | Star |
C. | Ring |
D. | All of above |
Answer» E. | |
59. |
The sender is a router that has received a datagram destined for a host on the same network. The logical address that must be mapped to a physical address is ______. |
A. | the destination IP address in the datagram header |
B. | the IP address of the router found in the routing table |
C. | either a or b |
D. | none of the above |
Answer» B. the IP address of the router found in the routing table | |
60. |
When the IP layer of a receiving host receives a datagram, _______. |
A. | delivery is complete |
B. | a transport layer protocol takes over |
C. | a header is added |
D. | none of the above |
Answer» C. a header is added | |
61. |
A port address in UDP is _______bits long. |
A. | 8 |
B. | 16 |
C. | 32 |
D. | any of the above |
Answer» C. 32 | |
62. |
Which of the following does UDP guarantee? |
A. | flow control |
B. | connection-oriented delivery |
C. | flow control |
D. | none of the above |
Answer» E. | |
63. |
ARQ stands for _______. |
A. | Automatic repeat quantization |
B. | Automatic repeat request |
C. | Automatic retransmission request |
D. | Acknowledge repeat request |
Answer» C. Automatic retransmission request | |
64. |
_______ in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations. |
A. | Digitizing |
B. | Controlling |
C. | Framing |
D. | none of the above |
Answer» D. none of the above | |
65. |
HDLC is an acronym for _______. |
A. | High-duplex line communication |
B. | High-level data link control |
C. | Half-duplex digital link combination |
D. | Host double-level circuit |
Answer» C. Half-duplex digital link combination | |
66. |
Rules that govern a communication exchange are |
A. | Media |
B. | Criteria |
C. | Protocol |
D. | All of above |
Answer» D. All of above | |
67. |
Heart of Data Encryption Standard (DES), is the |
A. | Cipher |
B. | Rounds |
C. | Encryption |
D. | DES function |
Answer» E. | |
68. |
In sliding window, if the window size is 63, what is the range of sequence numbers? |
A. | 0 to 63 |
B. | 0 to 64 |
C. | 1 to 63 |
D. | 1 to 64 |
Answer» B. 0 to 64 | |
69. |
The data link layer takes the packets from _____ and encapsulates them into frames fortransmission. |
A. | network layer |
B. | physical layer |
C. | transport layer |
D. | application layer |
Answer» B. physical layer | |
70. |
UDP needs the _______ address to deliver the user datagram to the correct applicationprocess. |
A. | port |
B. | application |
C. | internet |
D. | none of the above |
Answer» B. application | |
71. |
_______ refers to the structure or format of the data, meaning the order in which they arepresented. |
A. | Semantics |
B. | Syntax |
C. | Timing |
D. | All of the above |
Answer» C. Timing | |
72. |
In _______ transmission, the channel capacity is shared by both communicating devicesat all times. |
A. | simplex |
B. | half-duplex |
C. | full-duplex |
D. | half-simplex |
Answer» D. half-simplex | |
73. |
When a primary device wants to send data to a secondary device, it needs to first send _______ frame. |
A. | ACK |
B. | Poll |
C. | SEL |
D. | ENQ |
Answer» E. | |
74. |
________ defines how a particular pattern to be interpreted, and what action is to betaken based on that interpretation. |
A. | Semantics |
B. | Syntax |
C. | Timing |
D. | None of the above |
Answer» B. Syntax | |
75. |
UDP does not add anything to the services of IP except for providing _______communication. |
A. | node-to-node |
B. | process-to-process |
C. | host-to-host |
D. | none of the above |
Answer» C. host-to-host | |
76. |
This was the first network. |
A. | CSNET |
B. | NSFNET |
C. | ANSNET |
D. | ARPANET |
Answer» E. | |
77. |
_______________is a reliable delivery mechanism. |
A. | IP |
B. | TCP |
C. | UDP |
D. | ARP |
Answer» C. UDP | |
78. |
In _______ forwarding, the routing table holds the address of just the next hop instead of complete route information. |
A. | next-hop |
B. | network-specific |
C. | host-specific |
D. | default |
Answer» B. network-specific | |
79. |
In a network with 25 computers, which topology would require most extensive calling |
A. | Mesh |
B. | Star |
C. | Bus |
D. | Ring |
Answer» B. Star | |
80. |
In a ________ protocol, the data section of a frame is a sequence of characters. |
A. | bit-oriented |
B. | character-oriented |
C. | either (a) or (b) |
D. | none of the above |
Answer» C. either (a) or (b) | |
81. |
Transport layer is _____________ the data link layer. |
A. | Above |
B. | Below |
C. | Depended on |
D. | None of the above |
Answer» B. Below | |
82. |
In modulo-2 arithmetic, we use only ______. |
A. | 1 and 2 |
B. | 0 and 2 |
C. | 0 and 1 |
D. | none of the above |
Answer» D. none of the above | |
83. |
In the sending computer, UDP receives a data unit from the _______ layer. |
A. | application |
B. | transport |
C. | IP |
D. | none of the above |
Answer» B. transport | |
84. |
Differential Manchester and multi line transmission (MLT-3) schemes differ in |
A. | Number of transition rules to encode binary data |
B. | Self synchronization |
C. | Both a and b |
D. | None of the above |
Answer» D. None of the above | |
85. |
If the sender is a host and wants to send a packet to another host on the same network, the logical address that must be mapped to a physical address is ______. |
A. | the destination IP address in the datagram header |
B. | the IP address of the router found in the routing table |
C. | either a or b |
D. | none of the above |
Answer» B. the IP address of the router found in the routing table | |
86. |
Message _______ means that the receiver is ensured that the message is coming from theintended sender, not an imposter. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | none of the above |
Answer» D. none of the above | |
87. |
The principle of ________ states that the routing table is sorted from the longest mask tothe shortest mask. |
A. | first mask matching |
B. | shortest mask matching |
C. | longest mask matching |
D. | none of the above |
Answer» D. none of the above | |
88. |
Communication between a computer and a keyboard involves ______________transmission. |
A. | simplex |
B. | half-duplex |
C. | full-duplex |
D. | automatic |
Answer» B. half-duplex | |
89. |
An ARP reply is normally _______. |
A. | broadcast |
B. | multicast |
C. | unicast |
D. | none of the above |
Answer» D. none of the above | |
90. |
The PDU of network layer is |
A. | bits |
B. | frames |
C. | packets |
D. | none |
Answer» D. none | |
91. |
A technique called ______ is used to create a subnetting effect. |
A. | ARP |
B. | RARP |
C. | proxy ARP |
D. | none of the above |
Answer» D. none of the above | |
92. |
UDP is called a ________________transport protocol. |
A. | connectionless, reliable |
B. | connection-oriented, unreliable |
C. | connectionless, unreliable |
D. | none of the above |
Answer» D. none of the above | |
93. |
In ________ protocols, we use ________. |
A. | byte-oriented; bit stuffing |
B. | character-oriented; bit stuffing |
C. | bit-oriented; bit stuffing |
D. | none of the above |
Answer» D. none of the above | |
94. |
If the sender is a host and wants to send a packet to another host on another network, the logical address that must be mapped to a physical address is ______. |
A. | the destination IP address in the datagram header |
B. | the IP address of the router found in the routing table |
C. | either a or b |
D. | none of the above |
Answer» C. either a or b | |
95. |
A(n) ________function creates a message digest out of a message. |
A. | encryption |
B. | decryption |
C. | hash |
D. | none of the above |
Answer» D. none of the above | |
96. |
In a linear block code, the _______ of any two valid codewords creates another valid codeword |
A. | XORing |
B. | ORing |
C. | ANDing |
D. | none of the above |
Answer» B. ORing | |
97. |
Subnetting is actually |
A. | collection of networks |
B. | sub division of networks |
C. | one sub network |
D. | None |
Answer» C. one sub network | |
98. |
UDP is an acronym for _______. |
A. | User Delivery Protocol |
B. | User Datagram Procedure |
C. | User Datagram Protocol |
D. | None of the above |
Answer» D. None of the above | |
99. |
In modulo-11 arithmetic, we use only the integers in the range ______, inclusive. |
A. | 1 to 10 |
B. | 1 to 11 |
C. | 0 to 10 |
D. | none of the above |
Answer» D. none of the above | |
100. |
Performance of data communications depend on |
A. | No. of users |
B. | Transmission media |
C. | H/w and S/w |
D. | All of above |
Answer» E. | |