

MCQOPTIONS
Saved Bookmarks
This section includes 108 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
51. |
What kind of task does the Leaky Bucket algorithm do in traffic shaping technique? |
A. | Control congestion in network traffic. |
B. | Working on routing protocol. |
C. | Data flow control. |
D. | None of the above |
Answer» B. Working on routing protocol. | |
52. |
What kind of task does the Token Bucket Algorithm do on the network? |
A. | Drops data packets. |
B. | Allows for varying output rates. |
C. | Give low priority to the data packets. |
D. | Doesn't manage the queue regulator. |
Answer» C. Give low priority to the data packets. | |
53. |
What is/are the parameters of Quality of Service? |
A. | Connection establishment delay |
B. | Connection establishment failure probability |
C. | Protection and Priority |
D. | All of the above |
E. | None of the above |
Answer» E. None of the above | |
54. |
What is/are the characteristics of Connection Oriented Service? |
A. | The connection oriented services are reliable because there is a minimization of data loss and retransmission of lost bits is possible. |
B. | Connection oriented service is suitable for short communication. |
C. | Both a and b |
D. | The connection is not established in the connection oriented service. |
Answer» B. Connection oriented service is suitable for short communication. | |
55. |
What is/are the characteristics of RSVP? |
A. | It doesn’t provide reservations for bandwidth in multicast trees. |
B. | It is a receiver oriented. |
C. | Both a and b |
D. | None of the above |
Answer» C. Both a and b | |
56. |
What is/are the advantages of Token ring? |
A. | It doesn't provide a priority system that allow administrators to use the network more frequently. |
B. | Multiple identical MAC addresses are supported on Token ring. |
C. | All of the above |
D. | None of the above. |
Answer» C. All of the above | |
57. |
What is/are the advantages of the TCP/IP? |
A. | TCP/IP provides reliable communication across the internet. |
B. | Information on the internet is carried in packets. |
C. | TCP/IP is a robust and scalable network. |
D. | All of the above. |
Answer» E. | |
58. |
What is/are the advantages of the OSI model? |
A. | The OSI model is not a truly general model. |
B. | The protocols are hidden in the OSI model so they can easily replaced by new protocols when the technology changes |
C. | Both a and b |
D. | None of the above |
Answer» C. Both a and b | |
59. |
What is/are the advantages of TDMA? |
A. | provide entire bandwidth but not simultaneously |
B. | cost effective technology |
C. | offer personal communication |
D. | All of the above |
Answer» E. | |
60. |
What is/are the advantages of Data link layer? |
A. | Data link is not required for the effective exchange of data between source and destination. |
B. | Provide services to the session layer. |
C. | The errors can be detected and corrected during the transmission of data from source to destination. |
D. | All of the above. |
Answer» D. All of the above. | |
61. |
What is the use of TPDU in socket programming? |
A. | It creates new socket in the transport entity when it requests for a connection. |
B. | It allocates the table space within the transport entity. |
C. | It is used for establishing the connection. |
D. | None of the above. |
Answer» B. It allocates the table space within the transport entity. | |
62. |
What is the use of ICMP protocol in the network? |
A. | It provides a mechanism for host and management queries. |
B. | There is no flow control and congestion control. |
C. | It doesn't provide error reporting mechanism. |
D. | All of the above |
Answer» B. There is no flow control and congestion control. | |
63. |
What is the use of LAN bridges in the network? |
A. | Provides real time and non real time services. |
B. | Checks the MAC address of source and destination. |
C. | Provides broadband ISDN for the data packets. |
D. | None of the above |
Answer» C. Provides broadband ISDN for the data packets. | |
64. |
What is the purpose of using pseudo header in UDP? |
A. | The data packets are delivered sequentially. |
B. | Find out the destination port number and source port number. |
C. | Sends the context of a particular internet destination address to UDP. |
D. | Verifying the UDP packet has reached its correct destination. |
Answer» E. | |
65. |
What is the full form of TFTP? |
A. | Transmission File Transport Protocol |
B. | Trivial File Transfer Protocol |
C. | Transport File Transfer Protocol |
D. | None of the above |
Answer» C. Transport File Transfer Protocol | |
66. |
What is the difference between Virtual Circuit and Datagram? |
A. | The quality of service is easy in Virtual Circuit while it is difficult in Datagram. |
B. | In the connection oriented service, a connection is called as Virtual Circuit while in the connectionless service, the independent packets are called |
C. | The services are independent in Virtual Circuit but that won't be so in Datagrams. |
D. | Both a and b |
E. | Both b and c |
Answer» C. The services are independent in Virtual Circuit but that won't be so in Datagrams. | |
67. |
What is the difference between TCP and UDP? |
A. | TCP guarantees that a packet will reach the destination without any duplication while UDP does not provide this guarantee. |
B. | The order of data will be same in TCP but that won't be so in UDP. |
C. | TCP is unreliable protocol but UDP is a reliable protocol. |
D. | Only a and b |
E. | Only b and c |
Answer» E. Only b and c | |
68. |
What is the difference between Token Ring and Ethernet? |
A. | Ethernet network interface cards cannot operate on a passive hub but Token ring can operate on a passive hub. |
B. | Ethernet does have an access for priority system but Token ring doesn't have any access for priority system on the token. |
C. | Ethernet supports a direct cable connection while Token ring doesn't support a direct cable connection as it requires additional hardware and software |
D. | Ethernet can support MAC address. Token ring cannot support MAC address. |
Answer» D. Ethernet can support MAC address. Token ring cannot support MAC address. | |
69. |
What is the difference between TDMA and CDMA? |
A. | In CDMA only one user is allowed to share a channel or sub channel . while it is allowed in TDMA. |
B. | CDMA offers higher transmission quality than TDMA. |
C. | CDMA is a dominant technology in the wireless market than TDMA. |
D. | Both a and b |
E. | Both b and c |
Answer» C. CDMA is a dominant technology in the wireless market than TDMA. | |
70. |
What is the difference between MPLS and Virtual Circuit? |
A. | The forwarding table is mostly used in MPLS but not in Virtual Circuit. |
B. | The forwarding table is not constructed in Virtual Circuit but it is constructed in MPLS. |
C. | In virtual-circuit, the user establishes new connection and launches a set up packet and created the path while there is no set up for each connection |
D. | All of the above. |
Answer» D. All of the above. | |
71. |
What is the difference between IPv4 and IPv6? |
A. | The IPv4 address is written in hexadecimal value while the IPv6 address is written by dotted-decimal notation. |
B. | In IPV4 source and destination address is 128 bits while in IPv6 it is 32 bits. |
C. | The IPv4 node has only stateful auto-configuration while the IPv6 node has both a stateful and a stateless address auto-configuration. |
D. | In IPv4 the IPsec support is required while in IPv6 it is optional. |
Answer» D. In IPv4 the IPsec support is required while in IPv6 it is optional. | |
72. |
What is the difference between IP and ICMP? |
A. | IP is a reliable protocol while ICMP is an unreliable protocol. |
B. | In IP, error checking and control are not concerns while in ICMP it concerns. |
C. | IP provides assistance mechanisms while ICMP doesn't provide assistance mechanisms. |
D. | None of the above. |
Answer» C. IP provides assistance mechanisms while ICMP doesn't provide assistance mechanisms. | |
73. |
What is the difference between Delay and Jitter? |
A. | Delay takes less time for buffering while jitter takes more time for buffering. |
B. | Delay is defined as the end to end time required for the signal to travel from transmitter to receiver and Jitter is defined as the variation of delay |
C. | Time delay is a variable in delay but not in jitter. |
D. | All of the above |
Answer» C. Time delay is a variable in delay but not in jitter. | |
74. |
What is the difference between Class based QoS and Flow based QoS? |
A. | Class based QoS does not provide flexible service differentiation. Flow based QoS provide flexible service differentiation. |
B. | Class based QoS is a perception of users and it is more important than Flow based while Flow based QoS is not more important than class based. |
C. | Both a and b |
D. | None of the above. |
Answer» B. Class based QoS is a perception of users and it is more important than Flow based while Flow based QoS is not more important than class based. | |
75. |
What is the difference between forwarding and routing? |
A. | Forwarding does not transmit data on outgoing links, but routing does. |
B. | Forwarding finds suitable path for a packet than routing. |
C. | Forwarding is a part of decision making while routing is not. |
D. | Forwarding is used in telephony while routing is used in all networks. |
Answer» E. | |
76. |
What is the default port of HTTP? |
A. | 20 |
B. | 101 |
C. | 80 |
D. | 60 |
Answer» D. 60 | |
77. |
What is the default port of SMTP? |
A. | 85 |
B. | 70 |
C. | 80 |
D. | 25 |
Answer» E. | |
78. |
What is Quality of Service? |
A. | It is the capability of a network to provide better service to selected network traffic over various technologies. |
B. | It is a priority network that provides dedicated bandwidth, controlled jitter and latency. |
C. | Both a and b |
D. | None of the above |
Answer» D. None of the above | |
79. |
What is Packetizing? |
A. | It is a process of dividing a long message into smaller ones. |
B. | It is a process of encapsulating the packets into the data fields of the transport layer packet. |
C. | It is a process of an adding headers to each packet to allow the transport layer for performing its other functions. |
D. | All of the above. |
Answer» E. | |
80. |
What is Frame Check Sequence (FCS)? |
A. | FCS is an error recovery process. |
B. | FCS is an upper layer data. |
C. | FCS is an error detecting code. |
D. | FCS is a communication protocol. |
Answer» D. FCS is a communication protocol. | |
81. |
What is a path vector routing? |
A. | network routing protocol |
B. | inter-domain routing |
C. | exterior gateway protocol |
D. | None of the above |
Answer» B. inter-domain routing | |
82. |
What does the Link Control Protocol (LCP) do in PPP? |
A. | Set-up configure |
B. | Maintaining a link |
C. | Terminating a link |
D. | Both b and c |
E. | All of the above |
Answer» F. | |
83. |
Three way handshake technique in TCP is used __________. |
A. | to indicate the problems. |
B. | to solve the problem of delayed duplicate packet. |
C. | for data transmission |
D. | all of the above |
Answer» C. for data transmission | |
84. |
The protocol which is used for defining the legal request and replies is called ______ . |
A. | FTP |
B. | SMTP |
C. | TCP |
D. | HTTP |
Answer» E. | |
85. |
The connection oriented service is a dedicated connection between the users before the data is exchanged. |
A. | True |
B. | False |
Answer» B. False | |
86. |
The communication structure that we need in socket programming is called as _________. |
A. | System calls |
B. | Socket |
C. | Procedure |
D. | Table space |
Answer» C. Procedure | |
87. |
OSPF stands for _______ . |
A. | Object Service Priority First |
B. | Open Shortest Path First |
C. | Open Space Preservation Fund |
D. | Ocular Sun Protective Factor |
Answer» C. Open Space Preservation Fund | |
88. |
If all the links on the internet provide reliable delivery services, then will this TCP delivery service be redundant? |
A. | Yes |
B. | No |
Answer» C. | |
89. |
ICMP stands for ______________ . |
A. | Internet Component Mail Protocol |
B. | Internet Control Mail Protocol |
C. | Information Component Mail Protocol |
D. | Internet Control Message Protocol |
Answer» E. | |
90. |
How many layers are used in Hybrid model? |
A. | 7 |
B. | 3 |
C. | 5 |
D. | 4 |
Answer» D. 4 | |
91. |
HDLC is developed by ________ . |
A. | ISI |
B. | ISO |
C. | FPO |
D. | ITC |
Answer» C. FPO | |
92. |
Ethernet is a multi-access network and most successful local area networking technology. |
A. | True |
B. | False |
Answer» B. False | |
93. |
Differential Manchester encoding is also known as ___________ . |
A. | Clock Signals |
B. | Condition Diphase encoding |
C. | Bipolar encoding |
D. | Biphase mark code |
Answer» C. Bipolar encoding | |
94. |
Data transfer is _______ in FTP. |
A. | efficient |
B. | reliable |
C. | secure |
D. | unreliable |
Answer» C. secure | |
95. |
Consider the following types, I. Destination unreachable II. Source quench III. Query Messages IV. Time exceeded V . Redirection In the above, which is/are the error reporting types? |
A. | I, II, III |
B. | I, II, IV, V |
C. | III, IV, V |
D. | III, II, IV, V |
Answer» C. III, IV, V | |
96. |
Consider the following things which RSVP cannot do in the network? |
A. | It doesn’t specify the exactly reservation of the bandwidth. |
B. | It is not a routing protocol. |
C. | It does not perform any signaling operation. |
D. | All of the above. |
Answer» E. | |
97. |
Consider the following features, I. Load Balancing II. Security III. Easy to configure IV. Supports authentication What is/are the features of OSPF? |
A. | II, IV |
B. | II, III |
C. | I, II, IV |
D. | I, II, III |
Answer» D. I, II, III | |
98. |
Connection-oriented is a _______ connection. |
A. | secure |
B. | virtual |
C. | stable |
D. | reliable |
Answer» C. stable | |
99. |
Cluster is a group of ___________ . |
A. | regions |
B. | zones |
C. | resources. |
D. | parameters |
Answer» B. zones | |
100. |
Both HDLC and PPP are data link layer protocols. |
A. | True |
B. | False |
Answer» B. False | |