Explore topic-wise MCQs in Computer Science.

This section includes 415 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.

151.

The simultaneous transmission of data to a number of stations is known as

A. broadcast
B. Band width
C. Aloha
D. Analog transmission
Answer» B. Band width
152.

What is the main difference between DDCMP and SDLG?

A. DDCMP does not need special hardware to final the beginning of a message.
B. DDCMP has a message header
C. SDLC has a IP address
D. SDLC does not use CRC
Answer» B. DDCMP has a message header
153.

You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one?

A. 255.255.252.0
B. 225.255.254.0
C. 255.255.255.240
D. 255.255.255.252
Answer» B. 225.255.254.0
154.

The signal to noise ratio for a voice grade line is 30.1 dB (decibels) or a power ratio of 1023:1. The maximum achievable data rate on this line whose spectrum ranges from 300 Hz to 4300 Hz is

A. 6200 bps
B. 9600 bps
C. 34000 bps
D. 31000 bps
Answer» E.
155.

What is the name of the software package that allows people to send electronic mail along a network of computers and workstations?

A. Memory resident package
B. Project management package
C. Data communication package
D. Electronic mail package
Answer» D. Electronic mail package
156.

Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:

A. Network Server
B. Virtual Private Network
C. Network operating system
D. OSI
Answer» C. Network operating system
157.

What is the name of the computer based EMMS that provides a common forum where users can check in at their convenience, post messages, actively exchange ideas and participate in ongoing discussions?

A. E-mail
B. Bulletin board system (BBS)
C. Teleconferencing
D. Videoconferencing
Answer» C. Teleconferencing
158.

The transfer of data from a CPU to peripheral devices of a computer is achieved through

A. modems
B. computer ports
C. interfaces
D. buffer memory
Answer» C. interfaces
159.

Modulation in which the two binary values are represented by two different amplitudes of the carrier frequency is known as

A. Amplitude-shift keying
B. Amplitude
C. Amplitude modulation
D. Aloha
Answer» B. Amplitude
160.

When UPC is used, the price of the item is located

A. on the item
B. on the item and on the shelf
C. in computer storage
D. on the shelf and in computer storage
Answer» E.
161.

You have purchased a MAU (Multistation Access Unit) from your computer supplier and now must decide what type of network card you should install in the workstations. Which of the following would be the most appropriate?

A. Fast SCSI Wide
B. Token-Ring
C. ArcServe
D. Ethernet
Answer» C. ArcServe
162.

Error detection at the data link level is achieved by?

A. Bit stuffing
B. Hamming codes
C. Cyclic Redundancy codes
D. Equalization
Answer» D. Equalization
163.

When using the loopback address, if TCP/IP is installed correctly, when should you receive a response?

A. Immediately
B. Only if the address fails
C. After the next host comes online
D. Within two minutes
Answer» B. Only if the address fails
164.

Which of the following allows devices on one network to communicate with devices on another network?

A. multiplexer
B. gateway
C. t-switch
D. modern
Answer» C. t-switch
165.

Which of the following technique is used for encapsulation?

A. a technique used in best-effort delivery systems to avoid endlessly looping packets.
B. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame.
C. One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size
D. All of the above
Answer» C. One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size
166.

In communication satellite, multiple repeaters are known as

A. detector
B. modulator
C. stations
D. transponders
Answer» E.
167.

If odd parity is used for ASCII error detection, the number of 0s per eight-bit symbol is _____.

A. even
B. odd
C. indeterminate
D. 42
Answer» C. indeterminate
168.

You are in the process of analyzing a problem that requires you to collect and store TCP/IP Packets. Which of the following utilities is best suited for this purpose?

A. NBTSTAT
B. Performance Monitor
C. NETSTAT
D. Network Monitor
Answer» E.
169.

A 2000-character text file has to be transmitted by using a 1,200 baud modem. Can you tell how long will it take?

A. 2 seconds
B. 20 seconds
C. 120 seconds
D. 12 seconds
Answer» C. 120 seconds
170.

Interconnected networks need communication processors such as switches, routers, hubs, and gateways. Select the best fit for answer:

A. TCP/IP
B. Protocol
C. Open Systems
D. Internetwork processor
Answer» E.
171.

Operating system functions may include

A. input/output control
B. virtual storage
C. multiprogramming
D. All of the above
Answer» E.
172.

What is the full form of The Acronym ISDN in Networking?

A. Indian Standard Digital Network
B. Integrated Services Digital Network
C. Intelligent Services Digital Network
D. Integrated Services Data Network
Answer» C. Intelligent Services Digital Network
173.

Phase shift keying (psk) method is used to modulate digital signals at 9600 bps using 16 levels. Find the line signaling speed (i.e., modulation rate)

A. 2400 bands
B. 1200 bands
C. 4800 bands
D. 9600 bands.
Answer» B. 1200 bands
174.

Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.

A. Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology
B. Ethernet, because it is cabled using fiber-optic cable
C. Token-Ring, because it uses a MAU
D. Ethernet, because it can be set up with most topologies and can use multiple transfer speeds
Answer» E.
175.

In OSI model, which of the following layer provides error-free delivery of data?

A. Data link
B. Network
C. transport
D. Session
Answer» D. Session
176.

Which of the following allows a simple email service and is responsible for moving messages from one mail server to another?

A. IMAP
B. DHCP
C. SMTP
D. FTP
Answer» D. FTP
177.

Working of the WAN generally involves

A. telephone lines
B. microwaves
C. satellites
D. All of the above
Answer» E.
178.

A smart modem can dial, hang up and answer incoming calls automatically. Can you tell who provides the appropriate instruction to the modem for this purpose?

A. Communications software
B. Error detecting protocols
C. Link access procedure (LAP)
D. Telecommunications
Answer» B. Error detecting protocols
179.

Which file transfer protocol uses UDP?

A. NFS
B. TELNET
C. TFTP
D. FTP
Answer» D. FTP
180.

The physical layer, in reference to the OSI model, defines

A. data link procedures that provide for the exchange of data via frames that can be sent and received
B. the interface between the X.25 network and packet mode device
C. the virtual circuit interface to packet-switched service
D. All of the above
Answer» C. the virtual circuit interface to packet-switched service
181.

The area of coverage of a satellite radio beam is known as

A. Footprint
B. Circular polarization
C. Beam width
D. Identity
Answer» B. Circular polarization
182.

In a _____ topology, if there are n devices in a network, each device has n - 1 ports for cables.

A. ring
B. bus
C. star
D. mesh
Answer» E.
183.

You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 25 hosts and a maximum number of subnets?

A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
Answer» C. 255.255.255.240
184.

When the computer provides the manager with a multiple choice of possible answers, the prompting technique is

A. question and answer
B. form filling
C. open-ended question
D. menu selection
Answer» E.
185.

Which layer of international standard organization's OSI model is responsible for creating and recognizing frame boundaries?

A. physical layer
B. data link layer
C. transport layer
D. network layer
Answer» C. transport layer
186.

A proposed network infrastructure of interconnected local, regional, and global networks that would support universal interactive multimedia communications. Select the best fit for answer:

A. Internetworked enterprise
B. Information super highway
C. Business applications of telecommunications
D. Client/Server networks
Answer» C. Business applications of telecommunications
187.

On a class C network with a subnet mask of 192, how many subnets are available?

A. 254
B. 62
C. 30
D. 14
Answer» E.
188.

An internetworking protocol that provides virtual circuit service across multiple X.25 protocol, is

A. X.75
B. X.25
C. X.400
D. X.21
Answer» B. X.25
189.

A communications medium that uses pulses of laser light in glass fibers. Select the best fit for answer:

A. Fiber optic cables
B. Cellular phone systems
C. Telecommunications processors
D. Telecommunications software
Answer» B. Cellular phone systems
190.

The systematic access of small computers in a distributed data processing system is referred to as:

A. dialed service
B. multiplexing
C. polling
D. conversational mode
Answer» D. conversational mode
191.

Which of the following characteristic(s) is/are suited to the PSS applications?

A. bursty traffic and low communications intensity
B. widely dispersed terminals and access to international packets switched services
C. Multiple remote host or applications accessed by a single local access circuit terminal and circuit
D. All of the above
Answer» E.
192.

Which of the following technique is used for allocating capacity on a satellite channel using fixed-assignment FDM?

A. Amplitude modulation
B. Frequency-division multiple access
C. Frequency modulation
D. Frequency-shift keying
Answer» C. Frequency modulation
193.

Which of the following data transmission media has the largest terrestrial range without the use of repeaters or other devices?

A. Hardwiring
B. Microwave
C. Satellite
D. Laser
Answer» D. Laser
194.

The coming together of three technologies i.e. microelectronics, computing and communications has ushered in

A. information explosion
B. information technology
C. business revolution
D. educational upgradation
Answer» C. business revolution
195.

What is the first octet range for a class C IP address?

A. 192 - 255
B. 192 - 223
C. 192 - 226
D. 128 - 191
Answer» C. 192 - 226
196.

HDLC (High-level Data Link Control) is

A. a method of determining which device has access to the transmission medium at any time
B. a method access control technique for multiple-access transmission media
C. a very common bit-oriented data link protocol issued by ISO.
D. network access standard for connecting stations to a circuit-switched network
Answer» D. network access standard for connecting stations to a circuit-switched network
197.

An information utility can offer a user

A. instant bonds and stock quotations
B. news stories from wire services
C. complete airline schedules for all domestic flights
D. All of the above
Answer» E.
198.

You have a network ID of 134.57.0.0 with 8 subnets. You need to allow the largest possible number of host IDs per subnet. Which subnet mask should you assign?

A. 255.255.224.0
B. 255.255.240.0
C. 255.255.248.0
D. 255.255.252.0
Answer» C. 255.255.248.0
199.

What is the name of the device that connects two computers by means of a telephone line?

A. Tape
B. modem
C. bus
D. cable
Answer» C. bus
200.

What does 224 translate to in binary?

A. 11110000
B. 11110
C. 1111
D. 11100000
Answer» E.