Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

The simultaneous transmission of data to a number of stations is known as

A. broadcast
B. Band width
C. Aloha
D. Analog transmission
Answer» B. Band width
2.

What is the main difference between DDCMP and SDLG?

A. DDCMP does not need special hardware to final the beginning of a message.
B. DDCMP has a message header
C. SDLC has a IP address
D. SDLC does not use CRC
Answer» B. DDCMP has a message header
3.

You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one?

A. 255.255.252.0
B. 225.255.254.0
C. 255.255.255.240
D. 255.255.255.252
Answer» B. 225.255.254.0
4.

The signal to noise ratio for a voice grade line is 30.1 dB (decibels) or a power ratio of 1023:1. The maximum achievable data rate on this line whose spectrum ranges from 300 Hz to 4300 Hz is

A. 6200 bps
B. 9600 bps
C. 34000 bps
D. 31000 bps
Answer» E.
5.

What is the name of the software package that allows people to send electronic mail along a network of computers and workstations?

A. Memory resident package
B. Project management package
C. Data communication package
D. Electronic mail package
Answer» D. Electronic mail package
6.

Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:

A. Network Server
B. Virtual Private Network
C. Network operating system
D. OSI
Answer» C. Network operating system
7.

What is the name of the computer based EMMS that provides a common forum where users can check in at their convenience, post messages, actively exchange ideas and participate in ongoing discussions?

A. E-mail
B. Bulletin board system (BBS)
C. Teleconferencing
D. Videoconferencing
Answer» C. Teleconferencing
8.

The transfer of data from a CPU to peripheral devices of a computer is achieved through

A. modems
B. computer ports
C. interfaces
D. buffer memory
Answer» C. interfaces
9.

Modulation in which the two binary values are represented by two different amplitudes of the carrier frequency is known as

A. Amplitude-shift keying
B. Amplitude
C. Amplitude modulation
D. Aloha
Answer» B. Amplitude
10.

When UPC is used, the price of the item is located

A. on the item
B. on the item and on the shelf
C. in computer storage
D. on the shelf and in computer storage
Answer» E.
11.

You have purchased a MAU (Multistation Access Unit) from your computer supplier and now must decide what type of network card you should install in the workstations. Which of the following would be the most appropriate?

A. Fast SCSI Wide
B. Token-Ring
C. ArcServe
D. Ethernet
Answer» C. ArcServe
12.

Error detection at the data link level is achieved by?

A. Bit stuffing
B. Hamming codes
C. Cyclic Redundancy codes
D. Equalization
Answer» D. Equalization
13.

When using the loopback address, if TCP/IP is installed correctly, when should you receive a response?

A. Immediately
B. Only if the address fails
C. After the next host comes online
D. Within two minutes
Answer» B. Only if the address fails
14.

Which of the following allows devices on one network to communicate with devices on another network?

A. multiplexer
B. gateway
C. t-switch
D. modern
Answer» C. t-switch
15.

Which of the following technique is used for encapsulation?

A. a technique used in best-effort delivery systems to avoid endlessly looping packets.
B. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame.
C. One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size
D. All of the above
Answer» C. One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size
16.

In communication satellite, multiple repeaters are known as

A. detector
B. modulator
C. stations
D. transponders
Answer» E.
17.

If odd parity is used for ASCII error detection, the number of 0s per eight-bit symbol is _____.

A. even
B. odd
C. indeterminate
D. 42
Answer» C. indeterminate
18.

You are in the process of analyzing a problem that requires you to collect and store TCP/IP Packets. Which of the following utilities is best suited for this purpose?

A. NBTSTAT
B. Performance Monitor
C. NETSTAT
D. Network Monitor
Answer» E.
19.

A 2000-character text file has to be transmitted by using a 1,200 baud modem. Can you tell how long will it take?

A. 2 seconds
B. 20 seconds
C. 120 seconds
D. 12 seconds
Answer» C. 120 seconds
20.

Interconnected networks need communication processors such as switches, routers, hubs, and gateways. Select the best fit for answer:

A. TCP/IP
B. Protocol
C. Open Systems
D. Internetwork processor
Answer» E.
21.

Operating system functions may include

A. input/output control
B. virtual storage
C. multiprogramming
D. All of the above
Answer» E.
22.

What is the full form of The Acronym ISDN in Networking?

A. Indian Standard Digital Network
B. Integrated Services Digital Network
C. Intelligent Services Digital Network
D. Integrated Services Data Network
Answer» C. Intelligent Services Digital Network
23.

Phase shift keying (psk) method is used to modulate digital signals at 9600 bps using 16 levels. Find the line signaling speed (i.e., modulation rate)

A. 2400 bands
B. 1200 bands
C. 4800 bands
D. 9600 bands.
Answer» B. 1200 bands
24.

Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.

A. Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology
B. Ethernet, because it is cabled using fiber-optic cable
C. Token-Ring, because it uses a MAU
D. Ethernet, because it can be set up with most topologies and can use multiple transfer speeds
Answer» E.
25.

In OSI model, which of the following layer provides error-free delivery of data?

A. Data link
B. Network
C. transport
D. Session
Answer» D. Session
26.

Which of the following allows a simple email service and is responsible for moving messages from one mail server to another?

A. IMAP
B. DHCP
C. SMTP
D. FTP
Answer» D. FTP
27.

Working of the WAN generally involves

A. telephone lines
B. microwaves
C. satellites
D. All of the above
Answer» E.
28.

A smart modem can dial, hang up and answer incoming calls automatically. Can you tell who provides the appropriate instruction to the modem for this purpose?

A. Communications software
B. Error detecting protocols
C. Link access procedure (LAP)
D. Telecommunications
Answer» B. Error detecting protocols
29.

Which file transfer protocol uses UDP?

A. NFS
B. TELNET
C. TFTP
D. FTP
Answer» D. FTP
30.

The physical layer, in reference to the OSI model, defines

A. data link procedures that provide for the exchange of data via frames that can be sent and received
B. the interface between the X.25 network and packet mode device
C. the virtual circuit interface to packet-switched service
D. All of the above
Answer» C. the virtual circuit interface to packet-switched service
31.

The area of coverage of a satellite radio beam is known as

A. Footprint
B. Circular polarization
C. Beam width
D. Identity
Answer» B. Circular polarization
32.

In a _____ topology, if there are n devices in a network, each device has n - 1 ports for cables.

A. ring
B. bus
C. star
D. mesh
Answer» E.
33.

You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 25 hosts and a maximum number of subnets?

A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
Answer» C. 255.255.255.240
34.

When the computer provides the manager with a multiple choice of possible answers, the prompting technique is

A. question and answer
B. form filling
C. open-ended question
D. menu selection
Answer» E.
35.

Which layer of international standard organization's OSI model is responsible for creating and recognizing frame boundaries?

A. physical layer
B. data link layer
C. transport layer
D. network layer
Answer» C. transport layer
36.

A proposed network infrastructure of interconnected local, regional, and global networks that would support universal interactive multimedia communications. Select the best fit for answer:

A. Internetworked enterprise
B. Information super highway
C. Business applications of telecommunications
D. Client/Server networks
Answer» C. Business applications of telecommunications
37.

On a class C network with a subnet mask of 192, how many subnets are available?

A. 254
B. 62
C. 30
D. 14
Answer» E.
38.

An internetworking protocol that provides virtual circuit service across multiple X.25 protocol, is

A. X.75
B. X.25
C. X.400
D. X.21
Answer» B. X.25
39.

A communications medium that uses pulses of laser light in glass fibers. Select the best fit for answer:

A. Fiber optic cables
B. Cellular phone systems
C. Telecommunications processors
D. Telecommunications software
Answer» B. Cellular phone systems
40.

The systematic access of small computers in a distributed data processing system is referred to as:

A. dialed service
B. multiplexing
C. polling
D. conversational mode
Answer» D. conversational mode
41.

Which of the following characteristic(s) is/are suited to the PSS applications?

A. bursty traffic and low communications intensity
B. widely dispersed terminals and access to international packets switched services
C. Multiple remote host or applications accessed by a single local access circuit terminal and circuit
D. All of the above
Answer» E.
42.

Which of the following technique is used for allocating capacity on a satellite channel using fixed-assignment FDM?

A. Amplitude modulation
B. Frequency-division multiple access
C. Frequency modulation
D. Frequency-shift keying
Answer» C. Frequency modulation
43.

Which of the following data transmission media has the largest terrestrial range without the use of repeaters or other devices?

A. Hardwiring
B. Microwave
C. Satellite
D. Laser
Answer» D. Laser
44.

The coming together of three technologies i.e. microelectronics, computing and communications has ushered in

A. information explosion
B. information technology
C. business revolution
D. educational upgradation
Answer» C. business revolution
45.

What is the first octet range for a class C IP address?

A. 192 - 255
B. 192 - 223
C. 192 - 226
D. 128 - 191
Answer» C. 192 - 226
46.

HDLC (High-level Data Link Control) is

A. a method of determining which device has access to the transmission medium at any time
B. a method access control technique for multiple-access transmission media
C. a very common bit-oriented data link protocol issued by ISO.
D. network access standard for connecting stations to a circuit-switched network
Answer» D. network access standard for connecting stations to a circuit-switched network
47.

An information utility can offer a user

A. instant bonds and stock quotations
B. news stories from wire services
C. complete airline schedules for all domestic flights
D. All of the above
Answer» E.
48.

You have a network ID of 134.57.0.0 with 8 subnets. You need to allow the largest possible number of host IDs per subnet. Which subnet mask should you assign?

A. 255.255.224.0
B. 255.255.240.0
C. 255.255.248.0
D. 255.255.252.0
Answer» C. 255.255.248.0
49.

What is the name of the device that connects two computers by means of a telephone line?

A. Tape
B. modem
C. bus
D. cable
Answer» C. bus
50.

What does 224 translate to in binary?

A. 11110000
B. 11110
C. 1111
D. 11100000
Answer» E.