Explore topic-wise MCQs in Computer Science.

This section includes 108 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following statements is/are correct about Non Persistent HTTP?

A. Non Persistent HTTP connection is also called as HTTP keep-alive.
B. All the requests and responses between client and server can be sent over the same connection.
C. Non persistent uses HTTP version 2.0
D. All of the above
Answer» C. Non persistent uses HTTP version 2.0
2.

Which of the following statements is/are correct about distance vector?

A. Router don’t knows the identity of other router.
B. Cost of each couple is not equal to destination.
C. Each router maintains a distance vector.
D. All of the above.
Answer» D. All of the above.
3.

Which of the following statements is/are correct about the UDP header?

A. application programs use to send data to other application programs.
B. distinguish port numbers between multiple programs on a single device.
C. UDP have limited size header of 8 bytes.
D. Both a and b
E. Both a and c
Answer» E. Both a and c
4.

Which of the following statements is/are not correct about Leaky Bucket Algorithm?

A. It is a bucket with a hole at bottom.
B. Packets are never lost.
C. A variant on the leaky bucket is the token bucket.
D. Leaky bucket doesn't have the finite queue length.
Answer» E.
5.

Which of the following statements is/are not true about Persistent HTTP?

A. TCP connection is closed after the interval timeout by the http server.
B. The new connection is established and maintained for each request object.
C. Persistent will use HTTP version 1.1.
D. None of the above
Answer» B. The new connection is established and maintained for each request object.
6.

Which of the following statements is/are not true for connection-oriented network?

A. It doesn't give guarantee of service.
B. It takes less time for sending the packets.
C. Utilization of resources is good.
D. Both a and c
E. All of the above
Answer» F.
7.

Which of the following statements is/are true about OSPF?

A. error detecting process.
B. interior routing protocol.
C. widely used in TCP/IP.
D. create traffic load on multiple links.
Answer» C. widely used in TCP/IP.
8.

Which of the following statements is/are true about MPLS packets?

A. It creates a virtual circuit for transmission of data packets.
B. The label is used as an index for determining which outgoing line and new label is to be used. This new label contains the address of next MPLS router
C. MPLS packet hits a router, that router will contact the next router where the packet will be going to generate a label for the flow.
D. Both b and c
E. Both a and c
Answer» C. MPLS packet hits a router, that router will contact the next router where the packet will be going to generate a label for the flow.
9.

Which of the following statements is/are true about path vector routing?

A. Path vector routing is similar to the link state router.
B. Exterior Gateway Protocol (EGP) is used in Path Vector.
C. Maintains the path information and gets updated dynamically.
D. Not flexible in selecting the path while hiding the information.
Answer» D. Not flexible in selecting the path while hiding the information.
10.

Which of the following statements is/are true about Traffic shaping?

A. It is an open loop control.
B. It will not regulate the average rate of data transmission.
C. It is also known as traffic policing.
D. All of the above.
Answer» B. It will not regulate the average rate of data transmission.
11.

Which of the following statements is/are true for connectionless network?

A. Not required so much information for storing
B. No need to established a connection.
C. Randomly packets distributed.
D. All of the above.
E. None of the above.
Answer» E. None of the above.
12.

Which of the following statements is/are true if the transport layer is removed from the TCP/IP protocol stack?

A. Flow control will be handled
B. Data transfer will be reliable.
C. Byte stream won't be transferred to another machine.
D. None of the above
Answer» D. None of the above
13.

Which of the following types is/are the network connecting devices?

A. Repeaters and Hubs
B. Bridges and Routers
C. Gateway and switches
D. All of the above
Answer» E.
14.

Which protocol does FTP use for transferring the files in the network?

A. UDP
B. TCP
C. ICMP
D. ARP
Answer» C. ICMP
15.

Which protocol does TFTP use while working on the network?

A. ARP
B. FTP
C. UDP
D. TCP
Answer» D. TCP
16.

Which protocol does the PPP protocol provide for handling the capabilities of the connection/link on the network?

A. LCP
B. NCP
C. Both a and b
D. TCP
Answer» D. TCP
17.

Which protocol is used after authentication has been completed?

A. User Datagram Protocol
B. PPP Protocol
C. Transmission Control Protocol
D. Network Control Protocol
Answer» E.
18.

Which queue operation is used for holding the packets in Leaky Bucket implementation?

A. LIFO
B. FILO
C. FIFO
D. All of the above
Answer» D. All of the above
19.

Which type of addressing scheme is used in Message switching?

A. Hierarchical addresses
B. Geographical addresses
C. Manual addresses
D. All of the above
Answer» C. Manual addresses
20.

Why ATM was developed?

A. To handle both traditional high-throughput data traffic and real-time,low-latency content.
B. Designed to unify telecommunication and computer networks.
C. To meet the needs of the Broadband Integrated Services Digital Network.
D. All of the above.
Answer» E.
21.

Why Ipv6 replaces ARP by using the ND protocol?

A. The ARP address statically bound.
B. The security issues are apply.
C. Both a and b
D. The interface identifier portion of an Ipv6 address is directly derived from MAC address.
Answer» E.
22.

Why was the IETF developed?

A. to support quality of service
B. to create standardized protocols
C. for IP security
D. All of the above
Answer» C. for IP security
23.

Why was the Ipv6 protocol introduced?

A. IP security
B. Better Quality of Service support
C. Larger address space (128-bit in Ipv6, compared to the 32-bit address space in Ipv4)
D. All of the above
Answer» E.
24.

Which of the following statement is true about Connectionless service?

A. The connection is established in connectionless service.
B. Connectionless service is suitable for bursty transmission.
C. Connectionless services can give services guarantees.
D. Connectionless services can avoid bottleneck problem.
Answer» C. Connectionless services can give services guarantees.
25.

Which of the following protocol is used to allow the encapsulation of data coming from the network layer protocol?

A. TCP
B. NCP
C. LCP
D. HDLC
Answer» C. LCP
26.

Which of the following policies is/are related to Network layer?

A. Window policy
B. Traffic shaping
C. Traffic policing
D. Packet services
Answer» E.
27.

Which of the following methods is/are used in Packet switching?

A. Datagram Packet Switching
B. Virtual-circuit Packet Switching
C. Both a and b
D. None of the above
Answer» D. None of the above
28.

Which of the following methods is/are used in Message switching?

A. Store and Forward
B. Switch to Switch
C. Both a and b
D. None of the above
Answer» D. None of the above
29.

Which of the following is/are the Routing algorithms?

A. Nonadaptive algorithm and Adaptive algorithm
B. Static routing and Dynamic routing
C. Distance vector routing and link state routing
D. Both a and b
E. All of the above
Answer» E. All of the above
30.

Which of the following is/are the disadvantages of fragmentation?

A. All the packets should exit via the same gateway
B. Overhead doesn't required to repeatedly fragment.
C. Dos attack will encounter.
D. All of the above
Answer» B. Overhead doesn't required to repeatedly fragment.
31.

Which of the following is/are the advantages of hierarchical routing?

A. Portability
B. Scalability
C. Reliability
D. Flexibility
Answer» C. Reliability
32.

Which of the following is/are the advantages of connection-oriented networking

A. Quality of service
B. No Priority service
C. Bandwidth utilization
D. All of the above
Answer» E.
33.

Which of the following is/are functions of header subfields? I. Router change flag II. Virtual path identifier III. Header error control IV. Cell loss priority

A. III, IV
B. II, III, IV
C. I, II
D. I, III, II
Answer» C. I, II
34.

Which of the following is true about “Threshold”?

A. Threshold is a value.
B. Threshold has value levels, such as minimum level, maximum level, equal level.
C. If the data value doesn't suit the threshold value, then it indicates that this data value might lead to poor performance of the network.
D. All of the above
Answer» E.
35.

Which of the following is true about Network Control Protocol (NCP)?

A. It is strictly used for data authentication.
B. It decides the encapsulation of network layer data into the data link frame
C. It is useful to set-up configure, maintain and terminate a link connection.
D. All of the above.
Answer» C. It is useful to set-up configure, maintain and terminate a link connection.
36.

Which of the following is true about Manchester encoding?

A. Each bit period is divided into two equal intervals.
B. It requires more bandwidth than 8B/10B encoding.
C. It is a form of digital encoding.
D. All of the above
Answer» E.
37.

Which of the following is true about Domain Name System (DNS)?

A. DNS is the client server application.
B. It uses alias names for identifying the sender and receiver instead of an IP address. So the alias address has to be mapped to the IP address.
C. It identifies sender and receiver so they should be known to each other.
D. All of the above.
Answer» E.
38.

Which of the following is the communication protocol developed by ISO?

A. MPLS
B. PPP
C. HDLC
D. CRC
Answer» D. CRC
39.

Which of the following fundamental model helps to know the key problems for the designers of distributed system?

A. OSI model
B. Hybrid model
C. TCP/IP model
D. All of the above
Answer» E.
40.

Which of the following congestion control will not give converge in TCP congestion avoidance?

A. MIMD
B. AIAD
C. Both a and b
D. AIMD
Answer» D. AIMD
41.

Which of the following aspects is/are mostly covered in the FEC?

A. How many packets are there.
B. What type of service class is there
C. Which packets are going to be used.
D. Where the packets are going.
Answer» E.
42.

Which of the following are the HTTP methods (request types)? I. GET II. POST III. PATCH IV. BODY V. CREATE VI. OPTION

A. I, II, III, IV, V
B. I, II
C. IV, V, VI
D. I, II, III, VI
Answer» E.
43.

Which information form/type is used for transferring the data in Packet switching?

A. Morse
B. ASCII
C. Binary
D. Baudot
Answer» D. Baudot
44.

Which connection does the OSI model support in networking?

A. Connection-oriented
B. Connectionless
C. Both a and b
D. None of the above
Answer» D. None of the above
45.

Which cell does Asynchronous Transfer Mode (ATM) use?

A. Bridges
B. Switches
C. Routers
D. Hubs
Answer» C. Routers
46.

Which architectures is/are required to QoS?

A. Integrated Services
B. Differentiated Services
C. Reserved Services
D. Both a and b
E. Both b and c
Answer» E. Both b and c
47.

Which algorithm is best for use in TCP congestion avoidance?

A. MIMD
B. AIAD
C. Both a and b
D. AlMD
Answer» E.
48.

When too many packets are present in a part of a subnet the performance degrades, this situation is called as Congestion.

A. True
B. False
Answer» B. False
49.

When hierarchical routing is used on the internet?

A. Total number of routers are divided into different regions.
B. Routers cannot handle network traffic efficiently.
C. Router increases the network size.
D. None of the above
Answer» C. Router increases the network size.
50.

What kind of task does MIME do in the SMTP protocol?

A. It only transfers the email and not receive them.
B. It transfers a message from the SMTP sender to the SMTP receiver over a TCP/IP.
C. It works under the Mail Transfer Agent (MAT).
D. It encodes the binary files and send.
Answer» E.