

MCQOPTIONS
Saved Bookmarks
This section includes 415 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
301. |
After coding a document into a digital signal, it can be sent by telephone, telex or satellite to the receiver where the signal is decoded and an exact copy of the original document is made. What is it called? |
A. | Telex |
B. | Word processor |
C. | Facsimile |
D. | Electronic mail |
Answer» D. Electronic mail | |
302. |
If communication software can be called the "traffic cop" of a micro communication system, then what should the modem be called? |
A. | Park |
B. | Bridge |
C. | Interface |
D. | Link |
Answer» C. Interface | |
303. |
Which of the following types of channels moves data relatively slowly? |
A. | wideband channel |
B. | voiceband channel |
C. | narrowband channel |
D. | broadband channel |
Answer» D. broadband channel | |
304. |
What frequency range is used for TV transmission and low power microwave applications? |
A. | Very Low Frequency : 3 kHz to 30 kHz |
B. | Medium Frequency : 300 kHz to 3 MHz |
C. | Ultra High Frequency : 300 MHz to 3000 MHz |
D. | Super High Frequency : 3000 MHz to 30000 MHz |
Answer» D. Super High Frequency : 3000 MHz to 30000 MHz | |
305. |
Most data communications involving telegraph lines use: |
A. | simplex lines |
B. | wideband channels |
C. | narrowband channels |
D. | dialed service |
Answer» D. dialed service | |
306. |
A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame (assume header bits are negligible) that can be sent on this ring? |
A. | 8000 B frame |
B. | 80,000 B frame |
C. | 8 x 105 bit frame |
D. | 10,000 B frame |
Answer» E. | |
307. |
What is the minimum number of wires needed to send data over a serial communication link layer? |
A. | 1 |
B. | 2 |
C. | 4 |
D. | 6 |
Answer» C. 4 | |
308. |
In a synchronous modem, the digital-to-analog converter transmits signal to the |
A. | equalizer |
B. | modulator |
C. | demodulator |
D. | terminal |
Answer» B. modulator | |
309. |
Bandlimited signal is |
A. | transmission of signals without modulation |
B. | a signal all of whose energy is contained within a finite frequency range |
C. | simultaneous transmission of data to a number of stations |
D. | All of the above |
Answer» C. simultaneous transmission of data to a number of stations | |
310. |
Devices interconnected by the LAN should include |
A. | Computers and terminals |
B. | mass storage device, printers and plotters |
C. | bridges and gateways |
D. | All of the above |
Answer» E. | |
311. |
Number of bits per symbol used in Baudot code is |
A. | 1 |
B. | 5 |
C. | 8 |
D. | 9 |
Answer» C. 8 | |
312. |
Satellite-Switched Time-Division Multiple Access (SS/TDMA) is |
A. | the method of determining which device has access to the transmission medium at any time. |
B. | a medium access control technique for multiple access transmission media |
C. | a form of TDMA in which circuit switching is used to dynamically change the channel assignments |
D. | All of the above |
Answer» D. All of the above | |
313. |
Which of the following digits are known as the area code of the Network User Address (NUA)? |
A. | 43651 |
B. | 43556 |
C. | 43807 |
D. | 13-14 |
Answer» B. 43556 | |
314. |
Which of the following is used for modulation and demodulation? |
A. | modem |
B. | protocols |
C. | gateway |
D. | multiplexer |
Answer» B. protocols | |
315. |
The frequency range : 300 kHz to 3 MHz is used for |
A. | AM radio transmission |
B. | FM radio transmission |
C. | TV transmission |
D. | microwave communications, satellite and radar |
Answer» B. FM radio transmission | |
316. |
Who originally designed TCP/IP? |
A. | The Department of Defense |
B. | Novell |
C. | IBM |
D. | Xerox |
Answer» B. Novell | |
317. |
Which of the following technique is used for fragment? |
A. | a technique used in best-effort delivery systems to avoid endlessly looping packets |
B. | a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame |
C. | one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size |
D. | All of the above |
Answer» D. All of the above | |
318. |
What device separates a single network into two segments but lets the two segments appear as one to higher protocols? |
A. | Switch |
B. | Bridge |
C. | Gateway |
D. | Router |
Answer» C. Gateway | |
319. |
What does 192 translate to in binary? |
A. | 11000000 |
B. | 111110 |
C. | 1111 |
D. | 11 |
Answer» B. 111110 | |
320. |
Which of the following characteristics is not true of NetBEUI? |
A. | Highly-customizable |
B. | Routable |
C. | Little configuration required |
D. | Fast for small networks to Self-tuning |
Answer» C. Little configuration required | |
321. |
A form of modulation In which the amplitude of a carrier wave is varied in accordance with some characteristic of the modulating signal, is known as |
A. | Aloha |
B. | Angle modulation |
C. | Amplitude modulation |
D. | modem |
Answer» D. modem | |
322. |
Which network topology is considered passive? |
A. | Cross |
B. | Ring |
C. | Star |
D. | Mesh |
Answer» E. | |
323. |
A software that allows a personal computer to pretend it as a terminal is |
A. | auto-dialing |
B. | bulletin board |
C. | modem |
D. | terminal emulation |
Answer» B. bulletin board | |
324. |
The packets switching concept was first proposed |
A. | in the late 1980s for the Defense Ministry of US. |
B. | in the early 1960s for military communication systems, mainly to handle speech |
C. | in the late 1950s for Defense Ministry of US |
D. | All of the above |
Answer» C. in the late 1950s for Defense Ministry of US | |
325. |
The main difference between TCP and UDP is |
A. | UDP is connection oriented where as TCP is datagram service |
B. | TCP is an Internet protocol where as UDP is an ATM protocol |
C. | UDP is a datagram where as TCP is a connection oriented service |
D. | All of the above |
Answer» D. All of the above | |
326. |
Which of the following file retrieval methods use hypermedia? |
A. | HTTP |
B. | WAIS |
C. | Veronica |
D. | Archie |
Answer» B. WAIS | |
327. |
Sales persons and other employees of the company who spend much of their time away from their offices but keep in touch with their company's microcomputers or main frame computers over telephone lines are called |
A. | field workers |
B. | telecommuters |
C. | teleprocessors |
D. | company directors |
Answer» C. teleprocessors | |
328. |
Sending a file from your personal computer's primary memory or disk to another computer is called |
A. | uploading |
B. | downloading |
C. | logging on |
D. | hang on |
Answer» B. downloading | |
329. |
If you get both local and remote echoes, every character you type will appear on the screen |
A. | once |
B. | twice |
C. | three times |
D. | never |
Answer» C. three times | |
330. |
What part of 192.168.10.51 is the Network ID, assuming a default subnet mask? |
A. | 192 |
B. | 192.168.10 |
C. | 0.0.0.5 |
D. | 51 |
Answer» C. 0.0.0.5 | |
331. |
Alex is required to provide information on how many people are using the network at any one time. Which network will enable him to do so? |
A. | Server-based |
B. | Token-Ring |
C. | Ethernet |
D. | Star |
Answer» B. Token-Ring | |
332. |
Bulletin board system |
A. | is a public access message system |
B. | is a modem capable of accepting commands |
C. | converts analog signals to digital signals |
D. | converts digital signals to analog signals |
Answer» B. is a modem capable of accepting commands | |
333. |
When you ping the loopback address, a packet is sent where? |
A. | On the network |
B. | Down through the layers of the IP architecture and then up the layers again |
C. | Across the wire |
D. | through the loopback dongle |
Answer» C. Across the wire | |
334. |
Eight stations are competing for the use of the shared channel using the modified Adaptive free walk protocol by Gallager. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are needed to resolve the contention? |
A. | 1 slots |
B. | 5 slots |
C. | 10 slots |
D. | 14 slots |
Answer» C. 10 slots | |
335. |
After you have verified that TCP/IP is installed correctly, what is the next step in verifying the TCP/IP configuration? |
A. | Ping the broadcast address |
B. | Ping the Microsoft Web site |
C. | Ping a distant router. |
D. | Ping the address of the local host |
Answer» E. | |
336. |
Demodulation is the process of |
A. | converting digital signals to analog signals |
B. | converting analog signals to digital signals |
C. | combining many low speed channels into one high speed channel |
D. | dividing the high-speed signals into frequency bands |
Answer» C. combining many low speed channels into one high speed channel | |
337. |
With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts? |
A. | 192 |
B. | 224 |
C. | 240 |
D. | 248 |
Answer» E. | |
338. |
Which of the following communications service provides message preparation and transmission facilities? |
A. | Teletex |
B. | Teletext |
C. | x400 |
D. | Fax |
Answer» B. Teletext | |
339. |
The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard? |
A. | CSMA/CD |
B. | Token passing |
C. | Collision detection |
D. | Time sharing |
Answer» C. Collision detection | |
340. |
Which of the following statements is correct for the use of packet switching? |
A. | the subdivision of information into individually addressed packets in conjunction with alternative routing arrangement enabled the transmission path to be altered in the event of congestion or individual link failure |
B. | the employment of additional intelligence within the network enabled more sophisticated error control and link control procedures to be applied |
C. | by employing wide bandwidth circuits for the trunk networks substantial economies through extensive sharing of capacity could be achieved. |
D. | All of the above |
Answer» E. | |
341. |
Which of the following provides a storage mechanism for incoming mail but does not allow a user to download messages selectively? |
A. | SMTP |
B. | DHCP |
C. | IMAP |
D. | POP3 |
Answer» E. | |
342. |
What can greatly reduce TCP/IP configuration problems? |
A. | WINS Server |
B. | WINS Proxy |
C. | DHCP Server |
D. | PDC |
Answer» D. PDC | |
343. |
Which of the following device is used with an X.25 network to provide service to asynchronous terminals |
A. | repeater |
B. | bridges |
C. | gateway |
D. | Packet assembler/disassemble |
Answer» E. | |
344. |
If the ASCII character G is sent and the character D is received, what type of error is this? |
A. | single-bit |
B. | multiple-bit |
C. | burst |
D. | recoverable |
Answer» D. recoverable | |
345. |
A modulator converts a _____ signal to a(n) _____ signal. |
A. | FSK; PSK |
B. | PSK; FSK |
C. | analog; digital |
D. | digital; analog |
Answer» E. | |
346. |
Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine? |
A. | UDP |
B. | VMTP |
C. | X.25 |
D. | SMTP |
Answer» B. VMTP | |
347. |
Alice is setting up a small network in her home so that she can study for her MCSE exams. She doesn't have a lot of money to spend on hardware, so she wants to use a network topology that requires the least amount of hardware possible. Which topology should she select? |
A. | Star |
B. | Right |
C. | Token-Ring |
D. | Ethernet |
Answer» E. | |
348. |
What are the most commonly used transmission speeds in BPS used in data communication? |
A. | 300 |
B. | 1200 |
C. | 2400 |
D. | 9600 |
Answer» E. | |
349. |
The transport layer protocol is connectionless. |
A. | NVT |
B. | FTP |
C. | TCP |
D. | UDP |
Answer» E. | |
350. |
Error detecting code is |
A. | an error-detecting code based on a summation operation performed on the bits to be checked |
B. | a check bit appended to an array of binary digits to make the sum of all the binary digits. |
C. | a code in which each expression conforms to specify rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the error is detected. |
D. | the ratio of the data units in error to the total number of data units |
Answer» D. the ratio of the data units in error to the total number of data units | |