Explore topic-wise MCQs in Computer Science.

This section includes 415 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.

51.

The main difference between synchronous and asynchronous transmission is

A. the clocking is derived from the data in synchronous transmission
B. the clocking is mixed with the data in asynchronous transmission
C. the pulse height is different.
D. the bandwidth required is different
Answer» B. the clocking is mixed with the data in asynchronous transmission
52.

What does 240 translate to in binary?

A. 11110000
B. 11110
C. 1111
D. 11100000
Answer» B. 11110
53.

Messages from one computer terminal can be sent to another by using data networks. The message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone or satellite and then converted back again at the receiving end. What is this system of sending messages called?

A. Paperless office
B. Electronic mail
C. Global network
D. Electronic newspaper
Answer» C. Global network
54.

Error control is needed at the transport layer because of potential errors occurring _____.

A. from transmission line noise
B. in routers
C. from out-of-sequence delivery
D. from packet losses.
Answer» C. from out-of-sequence delivery
55.

Terminals are used to

A. collect data from the physical system
B. provide information for the manager
C. communicate management decisions to the physical system
D. All of the above
Answer» E.
56.

Which of the following is separated by a subnet mask?

A. DHCP scopes
B. Network ID and host ID
C. Domains
D. Subnets
Answer» C. Domains
57.

How many digits of the Network User Address are known as the DNIC (Data Network Identification Code)?

A. first three
B. first four
C. first five
D. first seven
Answer» C. first five
58.

If the client receives an address from a DHCP server, what is the only information available in the Network Properties dialog box?

A. The IP address
B. The subnet address
C. That the client is receiving its address from DHCP
D. The default gateway
Answer» D. The default gateway
59.

What is the main purpose of a data link content monitor?

A. to detect problems in protocols
B. to determine the type of transmission used in a data link
C. to determine the type of switching used in a data link.
D. to determine the flow of data
Answer» B. to determine the type of transmission used in a data link
60.

What is the first octet range for a class A IP address?

A. 1 - 126
B. 192 - 255
C. 192 - 223
D. 1 - 127
Answer» B. 192 - 255
61.

Error rate is

A. an error-detecting code based on a summation operation performed on the bits to be checked.
B. a check bit appended to an array of binary digits to make the sum of all the binary digits.
C. a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the errors is detected.
D. the ratio of the number of data units in error to the total number of data units
Answer» E.
62.

Which of the following TCP/IP protocol is used for remote terminal connection service?

A. TELNET
B. FTP
C. RARP
D. UDP
Answer» B. FTP
63.

A subdivision of main storage created by operational software is referred to as a:

A. compartment
B. time-shared program
C. divided core
D. partition
Answer» E.
64.

The application layer of a network

A. establishes, maintains, and terminates virtual circuits
B. defines the user's port into the network
C. consists of software being run on the computer connected to the network
D. All of the above
Answer» D. All of the above
65.

With an IP address of 201.142.23.12, what is your default subnet mask?

A. 0.0.0.0
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.0
Answer» E.
66.

Which of the following is considered a broadband communications channel?

A. coaxial cable
B. fiber optic cable
C. microwave circuits
D. satellites systems
Answer» E.
67.

In OSI model, which of the following layer transforms information from machine format into that understandable by user

A. application
B. presentation
C. session
D. physical
Answer» C. session
68.

What is the maximum number of entries in the HOSTS file?

A. 8
B. 255
C. 500
D. Unlimited
Answer» E.
69.

When you connect to an online information service, you are asked to provide some kind of identification such as your name, an account number and a password. What is the name given to this brief dialogue between you and the information system?

A. Security procedure
B. Safeguard procedure
C. Identification procedure
D. Log-on procedure
Answer» E.
70.

The first step in troubleshooting many problems is to verify which of the following?

A. The subnet mask is valid
B. TCP/IP is installed correctly on the client
C. The WINS server is running
D. The BDC is operable
Answer» C. The WINS server is running
71.

A central computer surrounded by one or more satellite computers is called a

A. bus network
B. ring network
C. star network
D. All of the above
Answer» D. All of the above
72.

Which of the following specifies the network address and host address of the computer?

A. The IP address
B. The TCP address
C. The subnet mask
D. The default gateway
Answer» B. The TCP address
73.

The interactive transmission of data within a time sharing system may be best suited to

A. simplex lines
B. half-duplex lines
C. full-duplex lines
D. biflex-line
Answer» C. full-duplex lines
74.

Which of the following medium is used for broadband local networks?

A. Coaxial cable
B. optic fiber
C. CATV
D. UTP
Answer» D. UTP
75.

The birthplace of the World Wide Web is considered to be

A. the Department of Defense
B. CERN
C. ARPA
D. Netscape
Answer» C. ARPA
76.

A protocol is a set of rules governing a time sequence of events that must take place

A. between peers
B. between modems
C. between an interface
D. across an interface
Answer» B. between modems
77.

You are working with a class C network. You are required to configure it for five subnets, each of which will support 25 nodes. What subnet should you use?

A. 255.255.255.0
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
Answer» C. 255.255.255.240
78.

RS-232-G

A. is an interface between two data circuit terminating equipment as examplified by a local and remote modem
B. is an interface standard between Data terminal Equipment and Data Circuit Terminating Equipment
C. specifies only the mechanical characteristics of an interface by providing a 25-pin connector
D. requires only 7 pin out of 25 in order to transmit digital data over public telephone lines
Answer» C. specifies only the mechanical characteristics of an interface by providing a 25-pin connector
79.

An example of a medium-speed, switched communications service is

A. Series 1000
B. Dataphone 50
C. DDD
D. All of the above
Answer» D. All of the above
80.

An international standard, multilevel set of protocols to promote compatibility among telecommunications networks. Select the best fit for answer:

A. Network Server
B. Virtual Private Network
C. Network operating system
D. OSI
Answer» E.
81.

Who invented the modem?

A. Wang Laboratories Ltd.
B. AT & T Information Systems, USA
C. Apple Computers Inc.
D. Digital Equipment Corpn.
Answer» C. Apple Computers Inc.
82.

What is the name of the network topology in which there are bi-directional links between each possible node?

A. Ring
B. Star
C. Tree
D. Mesh
Answer» E.
83.

Which layer of OSI determines the interface of the system with the user?

A. Network
B. Application
C. Data-link
D. Session
Answer» C. Data-link
84.

Which of the following protocol is connection-oriented?

A. IPX
B. UDP
C. NetBEUI
D. TCP
Answer» E.
85.

Which address is the loopback address?

A. 0.0.0.1
B. 127.0.0.0
C. 127.0.0.1
D. 255.255.255.255
Answer» D. 255.255.255.255
86.

Transmission of computerised data from one location to another is called

A. data transfer
B. data flow
C. data communication
D. data management
Answer» D. data management
87.

Stephanie is in charge of a small network and wants to make it simple but secure. The users want to have full control over their data and still be able to share data with the rest of the office. The networking knowledge of the office staff is basic. Which network(s) would be the best for Stephanie to set up?

A. Peer-to-peer
B. Master domain
C. Server-based
D. WAN
Answer» D. WAN
88.

The fundamental requirements of private-to-public network interconnection methods which need to be provided in gateways is/are

A. universal accessibility for private network Data Terminal Equipment (DTE)
B. adequate cost control mechanisms for administration of the private networks
C. to assign address to private network DTEs
D. a and b both
Answer» E.
89.

What frequency range is used for microwave communications, satellite and radar?

A. Low Frequency : 30 kHz to 300 kHz
B. Medium Frequency : 300 kHz to 3 MHz
C. Super High Frequency : 3000 MHz to 30000 MHz
D. Extremely High Frequency :30,000 MHz
Answer» E.
90.

What is the loopback address?

A. 127.0.0.1
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.255.0
Answer» B. 255.0.0.0
91.

The communication mode that supports data in both directions at the same time is

A. simplex
B. half-duplex
C. full-duplex
D. multiplex
Answer» D. multiplex
92.

How many class A, B, and C network IDs can exist?

A. 2113658
B. 16382
C. 126
D. 128
Answer» B. 16382
93.

A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as

A. Gateways
B. mail gateway
C. bridges
D. User Agent
Answer» C. bridges
94.

Which of the following might be used by a company to satisfy its growing communications needs?

A. front-end processor
B. multiplexer
C. controller
D. concentrator
Answer» E.
95.

The receive equalizer reduces delay distortions using a

A. tapped delay lines
B. gearshift
C. descrambler
D. difference engine
Answer» B. gearshift
96.

Establishing a virtual connection is functionally equivalent to

A. Connecting as virtual memory
B. Physically connecting a DTE and DCE
C. Placing a telephone call prior to a conversation
D. Placing a modem prior to a conversation
Answer» D. Placing a modem prior to a conversation
97.

In cyclic redundancy checking, the divisor is _____ the CRC.

A. the same size as
B. one bit less than
C. one bit more than
D. two bits more
Answer» D. two bits more
98.

You need to determine whether IP information has been assigned to your Windows NT. Which utility should you use?

A. NBTSTAT
B. NETSTAT
C. IPCONFIG
D. WINIPCFG
Answer» D. WINIPCFG
99.

Many data communication networks have been established which provide a wealth of on-demand information services to people at home. What is the name of the system which provides an interactive, graphics-rich service that permits user to select what they want?

A. Teletex system
B. Fax system
C. Videotex system
D. Microwave system
Answer» D. Microwave system
100.

What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard?

A. 4
B. 2
C. 6
D. 3
Answer» E.