

MCQOPTIONS
This section includes 398 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
351. |
Ethernet in metropolitan area network (MAN) can be used as: |
A. | pure ethernet |
B. | ethernet over SDH |
C. | ethernet over MPLS |
D. | all of the mentioned |
Answer» E. | |
352. |
What is autonegotiation? |
A. | a procedure by which two connected devices choose common transmission parameters |
B. | a security algorithm |
C. | a routing algorithm |
D. | none of the mentioned |
Answer» B. a security algorithm | |
353. |
MAC address is of: |
A. | 24 bits |
B. | 36 bits |
C. | 42 bits |
D. | 48 bits |
Answer» E. | |
354. |
What is stat frame delimeter (SFD) in ethernet frame? |
A. | 10101010 |
B. | 10101011 |
C. | 00000000 |
D. | 11111111 |
Answer» C. 00000000 | |
355. |
Which of the following is present in both an HTTP request line and a status line? |
A. | HTTP version number |
B. | URL |
C. | Method |
D. | None of the mentioned |
Answer» B. URL | |
356. |
The conditional GET mechanism |
A. | Imposes conditions on the objects to be requested |
B. | Limits the number of response from a server |
C. | Helps to keep a cache upto date |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
357. |
Which of the following is not correct ? |
A. | Web cache doesnt has its own disk space |
B. | Web cache can act both like server and client |
C. | Web cache might reduce the response time |
D. | Web cache contains copies of recently requested objects |
Answer» B. Web cache can act both like server and client | |
358. |
Find the oddly matched HTTP status codes |
A. | 200 OK |
B. | 400 Bad Request |
C. | 301 Moved permanently |
D. | 304 Not Found |
Answer» E. | |
359. |
The HTTP response message leaves out the requested object when _____ method is used |
A. | GET |
B. | POST |
C. | HEAD |
D. | PUT |
Answer» D. PUT | |
360. |
The ______ method when used in the method field, leaves entity body empty. |
A. | POST |
B. | GET |
C. | Both of the mentioned |
D. | None of the mentioned |
Answer» C. Both of the mentioned | |
361. |
The values GET, POST, HEAD etc are specified in ____ of HTTP message |
A. | Request line |
B. | Header line |
C. | Status line |
D. | Entity body |
Answer» B. Header line | |
362. |
The first line of HTTP request message is called ____ |
A. | Request line |
B. | Header line |
C. | Status line |
D. | Entity line |
Answer» B. Header line | |
363. |
In the process of fetching a web page from a server the HTTP request/response takes ______ RTTs. |
A. | 2 |
B. | 1 |
C. | 4 |
D. | 3 |
Answer» C. 4 | |
364. |
The HTTP request message is sent in ____ part of three-way handshake. |
A. | First |
B. | Second |
C. | Third |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
365. |
The time taken by a packet to travel from client to server and then back to the client is called ____ |
A. | STT |
B. | RTT |
C. | PTT |
D. | None of the mentioned |
Answer» C. PTT | |
366. |
The default connection type used by HTTP is _____ |
A. | Persistent |
B. | Non-persistent |
C. | Either of the mentioned |
D. | None of the mentioned |
Answer» B. Non-persistent | |
367. |
The number of objects in a Web page which consists of 4 jpeg images and HTML text is ______ |
A. | 4 |
B. | 1 |
C. | 5 |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
368. |
The technique of temporarily delaying outgoing outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called: |
A. | piggybacking |
B. | cyclic redundancy check |
C. | fletcher’s checksum |
D. | none of the mentioned |
Answer» B. cyclic redundancy check | |
369. |
Which one of the following is the multiple access protocol for channel access control? |
A. | CSMA/CD |
B. | CSMA/CA |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
370. |
Which one of the following is a data link protocol? |
A. | ethernet |
B. | point to point protocol |
C. | HDLC |
D. | all of the mentioned |
Answer» E. | |
371. |
CRC stands for: |
A. | cyclic redundancy check |
B. | code repeat check |
C. | code redundancy check |
D. | cyclic repeat check |
Answer» B. code repeat check | |
372. |
When 2 or more bits in a data unit has been changed during the transmission, the error is called: |
A. | random error |
B. | burst error |
C. | inverted error |
D. | none of the mentioned |
Answer» C. inverted error | |
373. |
Automatic repeat request error management mechanism is provided by: |
A. | logical link control sublayer |
B. | media access control sublayer |
C. | network interface control sublayer |
D. | none of the mentioned |
Answer» B. media access control sublayer | |
374. |
Header of a frame generally contains: |
A. | synchronization bytes |
B. | addresses |
C. | frame identifier |
D. | all of the mentioned |
Answer» E. | |
375. |
Which sublayer of the data link layer performs data link functions that depend upon the type of medium? |
A. | logical link control sublayer |
B. | media access control sublayer |
C. | network interface control sublayer |
D. | none of the mentioned |
Answer» C. network interface control sublayer | |
376. |
Which one of the following task is not done by data link layer? |
A. | framing |
B. | error control |
C. | flow control |
D. | channel coding |
Answer» E. | |
377. |
The data link layer takes the packets from _____ and encapsulates them into frames for transmission. |
A. | network layer |
B. | physical layer |
C. | transport layer |
D. | application layer |
Answer» B. physical layer | |
378. |
Which transmission media has the highest transmission speed in a network? |
A. | coaxial cable |
B. | twisted pair cable |
C. | optical fiber |
D. | electrical cable |
Answer» D. electrical cable | |
379. |
Three or more devices share a link in ________ connection: |
A. | Unipoint |
B. | Multipoint |
C. | Point to point |
D. | None of the mentioned |
Answer» C. Point to point | |
380. |
A set of rules that governs data communication: |
A. | Protocols |
B. | Standards |
C. | RFCs |
D. | None of the mentioned |
Answer» B. Standards | |
381. |
Which of this is not a network edge device? |
A. | PC |
B. | Smartphones |
C. | Servers |
D. | Switch |
Answer» E. | |
382. |
Which organization has authority over interstate and international commerce in the communications field? |
A. | ITU-T |
B. | IEEE |
C. | FCC |
D. | ISOC |
Answer» D. ISOC | |
383. |
The _______ is the physical path over which a message travels: |
A. | Ppath |
B. | Medium |
C. | Protocol |
D. | Route |
Answer» C. Protocol | |
384. |
The first Network: |
A. | CNNET |
B. | NSFNET |
C. | ASAPNET |
D. | ARPANET |
Answer» E. | |
385. |
Communication between a computer and a keyboard involves ______________ transmission. |
A. | Automatic |
B. | Half-duplex |
C. | Full-duplex |
D. | Simplex |
Answer» E. | |
386. |
The structure or format of data is called: |
A. | Syntax |
B. | Semantics |
C. | Struct |
D. | None of the mentioned |
Answer» B. Semantics | |
387. |
In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are: |
A. | Added |
B. | Removed |
C. | Rearranged |
D. | Modified |
Answer» B. Removed | |
388. |
The IETF standards documents are called: |
A. | RFC |
B. | RCF |
C. | ID |
D. | None of the mentioned |
Answer» B. RCF | |
389. |
Which one of the following extends a private network across public networks? |
A. | local area network |
B. | virtual private network |
C. | enterprise private network |
D. | storage area network |
Answer» C. enterprise private network | |
390. |
Network congestion occurs: |
A. | in case of traffic overloading |
B. | when a system terminates |
C. | when connection between two nodes terminates |
D. | none of the mentioned |
Answer» B. when a system terminates | |
391. |
A list of protocols used by a system, one protocol per layer, is called: |
A. | protocol architecture |
B. | protocol stack |
C. | protocol suit |
D. | none of the mentioned |
Answer» C. protocol suit | |
392. |
A _____ is a device that forwards packets between networks by processing the routing information included in the packet. |
A. | bridge |
B. | firewall |
C. | router |
D. | all of the mentioned |
Answer» D. all of the mentioned | |
393. |
Bluetooth is an example of: |
A. | personal area network |
B. | local area network |
C. | virtual private network |
D. | none of the mentioned |
Answer» B. local area network | |
394. |
Communication channel is shared by all the machines on the network in: |
A. | broadcast network |
B. | unicast network |
C. | multicast network |
D. | none of the mentioned |
Answer» B. unicast network | |
395. |
In computer network nodes are: |
A. | the computer that originates the data |
B. | the computer that routes the data |
C. | the computer that terminates the data |
D. | all of the mentioned |
Answer» E. | |
396. |
Which one of the following computer network is built on the top of another network? |
A. | prior network |
B. | chief network |
C. | prime network |
D. | overlay network |
Answer» E. | |
397. |
Two devices are in network if: |
A. | a process in one device is able to exchange information with a process in another device |
B. | a process is running on both devices |
C. | PIDs of the processes running of different devices are same |
D. | none of the mentioned |
Answer» B. a process is running on both devices | |
398. |
When collection of various computers seems a single coherent system to its client, then it is called: |
A. | computer network |
B. | distributed system |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» C. both (a) and (b) | |