Explore topic-wise MCQs in Technical Programming.

This section includes 398 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.

351.

Ethernet in metropolitan area network (MAN) can be used as:

A. pure ethernet
B. ethernet over SDH
C. ethernet over MPLS
D. all of the mentioned
Answer» E.
352.

What is autonegotiation?

A. a procedure by which two connected devices choose common transmission parameters
B. a security algorithm
C. a routing algorithm
D. none of the mentioned
Answer» B. a security algorithm
353.

MAC address is of:

A. 24 bits
B. 36 bits
C. 42 bits
D. 48 bits
Answer» E.
354.

What is stat frame delimeter (SFD) in ethernet frame?

A. 10101010
B. 10101011
C. 00000000
D. 11111111
Answer» C. 00000000
355.

Which of the following is present in both an HTTP request line and a status line?

A. HTTP version number
B. URL
C. Method
D. None of the mentioned
Answer» B. URL
356.

The conditional GET mechanism

A. Imposes conditions on the objects to be requested
B. Limits the number of response from a server
C. Helps to keep a cache upto date
D. None of the mentioned
Answer» D. None of the mentioned
357.

 

Which of the following is not correct ?

A. Web cache doesnt has its own disk space
B. Web cache can act both like server and client
C. Web cache might reduce the response time
D. Web cache contains copies of recently requested objects
Answer» B. Web cache can act both like server and client
358.

Find the oddly matched HTTP status codes

A. 200 OK
B. 400 Bad Request
C. 301 Moved permanently
D. 304 Not Found
Answer» E.
359.

The HTTP response message leaves out the requested object when _____ method is used

A. GET
B. POST
C. HEAD
D. PUT
Answer» D. PUT
360.

The ______ method when used in the method field, leaves entity body empty.

A. POST
B. GET
C. Both of the mentioned
D. None of the mentioned
Answer» C. Both of the mentioned
361.

The values GET, POST, HEAD etc are specified in ____ of HTTP message

A. Request line
B. Header line
C. Status line
D. Entity body
Answer» B. Header line
362.

The first line of HTTP request message is called ____

A. Request line
B. Header line
C. Status line
D. Entity line
Answer» B. Header line
363.

In the process of fetching a web page from a server the HTTP request/response takes ______ RTTs.

A. 2
B. 1
C. 4
D. 3
Answer» C. 4
364.

The HTTP request message is sent in ____ part of three-way handshake.

A. First
B. Second
C. Third
D. None of the mentioned
Answer» D. None of the mentioned
365.

 

The time taken by a packet to travel from client to server and then back to the client is called ____

A. STT
B. RTT
C. PTT
D. None of the mentioned
Answer» C. PTT
366.

The default connection type used by HTTP is _____

A. Persistent
B. Non-persistent
C. Either of the mentioned
D. None of the mentioned
Answer» B. Non-persistent
367.

The number of objects in a Web page which consists of 4 jpeg images and HTML text is ______

A. 4
B. 1
C. 5
D. None of the mentioned
Answer» D. None of the mentioned
368.

The technique of temporarily delaying outgoing outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called:

A. piggybacking
B. cyclic redundancy check
C. fletcher’s checksum
D. none of the mentioned
Answer» B. cyclic redundancy check
369.

 Which one of the following is the multiple access protocol for channel access control?

A. CSMA/CD
B. CSMA/CA
C. both (a) and (b)
D. none of the mentioned
Answer» D. none of the mentioned
370.

Which one of the following is a data link protocol?

A. ethernet
B. point to point protocol
C. HDLC
D. all of the mentioned
Answer» E.
371.

CRC stands for:

A. cyclic redundancy check
B. code repeat check
C. code redundancy check
D. cyclic repeat check
Answer» B. code repeat check
372.

When 2 or more bits in a data unit has been changed during the transmission, the error is called:

A. random error
B. burst error
C. inverted error
D. none of the mentioned
Answer» C. inverted error
373.

Automatic repeat request error management mechanism is provided by:

A. logical link control sublayer
B. media access control sublayer
C. network interface control sublayer
D. none of the mentioned
Answer» B. media access control sublayer
374.

Header of a frame generally contains:

A. synchronization bytes
B. addresses
C. frame identifier
D. all of the mentioned
Answer» E.
375.

Which sublayer of the data link layer performs data link functions that depend upon the type of medium?

A. logical link control sublayer
B. media access control sublayer
C. network interface control sublayer
D. none of the mentioned
Answer» C. network interface control sublayer
376.

Which one of the following task is not done by data link layer?

A. framing
B. error control
C. flow control
D. channel coding
Answer» E.
377.

The data link layer takes the packets from _____ and encapsulates them into frames for transmission.

A. network layer
B. physical layer
C. transport layer
D. application layer
Answer» B. physical layer
378.

Which transmission media has the highest transmission speed in a network?

A. coaxial cable
B. twisted pair cable
C. optical fiber
D. electrical cable
Answer» D. electrical cable
379.

Three or more devices share a link in ________ connection:

A. Unipoint
B. Multipoint
C. Point to point
D. None of the mentioned
Answer» C. Point to point
380.

A set of rules that governs data communication:

A. Protocols
B. Standards
C. RFCs
D. None of the mentioned
Answer» B. Standards
381.

 Which of this is not a network edge device?

A. PC
B. Smartphones
C. Servers
D. Switch
Answer» E.
382.

Which organization has authority over interstate and international commerce in the communications field?

A. ITU-T
B. IEEE
C. FCC
D. ISOC
Answer» D. ISOC
383.

The _______ is the physical path over which a message travels:

A. Ppath
B. Medium
C. Protocol
D. Route
Answer» C. Protocol
384.

The first Network:

A. CNNET
B. NSFNET
C. ASAPNET
D. ARPANET
Answer» E.
385.

Communication between a computer and a keyboard involves ______________ transmission.

A. Automatic
B. Half-duplex
C. Full-duplex
D. Simplex
Answer» E.
386.

The structure or format of data is called:

A. Syntax
B. Semantics
C. Struct
D. None of the mentioned
Answer» B. Semantics
387.

In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are:

A. Added
B. Removed
C. Rearranged
D. Modified
Answer» B. Removed
388.

The IETF standards documents are called:

A. RFC
B. RCF
C. ID
D. None of the mentioned
Answer» B. RCF
389.

Which one of the following extends a private network across public networks?

A. local area network
B. virtual private network
C. enterprise private network
D. storage area network
Answer» C. enterprise private network
390.

Network congestion occurs:

A. in case of traffic overloading
B. when a system terminates
C. when connection between two nodes terminates
D. none of the mentioned
Answer» B. when a system terminates
391.

A list of protocols used by a system, one protocol per layer, is called:

A. protocol architecture
B. protocol stack
C. protocol suit
D. none of the mentioned
Answer» C. protocol suit
392.

A _____ is a device that forwards packets between networks by processing the routing information included in the packet.

A. bridge
B. firewall
C. router
D. all of the mentioned
Answer» D. all of the mentioned
393.

 Bluetooth is an example of:

A. personal area network
B. local area network
C. virtual private network
D. none of the mentioned
Answer» B. local area network
394.

Communication channel is shared by all the machines on the network in:

A. broadcast network
B. unicast network
C. multicast network
D. none of the mentioned
Answer» B. unicast network
395.

In computer network nodes are:

A. the computer that originates the data
B. the computer that routes the data
C. the computer that terminates the data
D. all of the mentioned
Answer» E.
396.

Which one of the following computer network is built on the top of another network?

A. prior network
B. chief network
C. prime network
D. overlay network
Answer» E.
397.

Two devices are in network if:

A. a process in one device is able to exchange information with a process in another device
B. a process is running on both devices
C. PIDs of the processes running of different devices are same
D. none of the mentioned
Answer» B. a process is running on both devices
398.

When collection of various computers seems a single coherent system to its client, then it is called:

A. computer network
B. distributed system
C. both (a) and (b)
D. none of the mentioned
Answer» C. both (a) and (b)