Explore topic-wise MCQs in Computer Science.

This section includes 108 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.

51.

What kind of task does the Leaky Bucket algorithm do in traffic shaping technique?

A. Control congestion in network traffic.
B. Working on routing protocol.
C. Data flow control.
D. None of the above
Answer» B. Working on routing protocol.
52.

What kind of task does the Token Bucket Algorithm do on the network?

A. Drops data packets.
B. Allows for varying output rates.
C. Give low priority to the data packets.
D. Doesn't manage the queue regulator.
Answer» C. Give low priority to the data packets.
53.

What is/are the parameters of Quality of Service?

A. Connection establishment delay
B. Connection establishment failure probability
C. Protection and Priority
D. All of the above
E. None of the above
Answer» E. None of the above
54.

What is/are the characteristics of Connection Oriented Service?

A. The connection oriented services are reliable because there is a minimization of data loss and retransmission of lost bits is possible.
B. Connection oriented service is suitable for short communication.
C. Both a and b
D. The connection is not established in the connection oriented service.
Answer» B. Connection oriented service is suitable for short communication.
55.

What is/are the characteristics of RSVP?

A. It doesn’t provide reservations for bandwidth in multicast trees.
B. It is a receiver oriented.
C. Both a and b
D. None of the above
Answer» C. Both a and b
56.

What is/are the advantages of Token ring?

A. It doesn't provide a priority system that allow administrators to use the network more frequently.
B. Multiple identical MAC addresses are supported on Token ring.
C. All of the above
D. None of the above.
Answer» C. All of the above
57.

What is/are the advantages of the TCP/IP?

A. TCP/IP provides reliable communication across the internet.
B. Information on the internet is carried in packets.
C. TCP/IP is a robust and scalable network.
D. All of the above.
Answer» E.
58.

What is/are the advantages of the OSI model?

A. The OSI model is not a truly general model.
B. The protocols are hidden in the OSI model so they can easily replaced by new protocols when the technology changes
C. Both a and b
D. None of the above
Answer» C. Both a and b
59.

What is/are the advantages of TDMA?

A. provide entire bandwidth but not simultaneously
B. cost effective technology
C. offer personal communication
D. All of the above
Answer» E.
60.

What is/are the advantages of Data link layer?

A. Data link is not required for the effective exchange of data between source and destination.
B. Provide services to the session layer.
C. The errors can be detected and corrected during the transmission of data from source to destination.
D. All of the above.
Answer» D. All of the above.
61.

What is the use of TPDU in socket programming?

A. It creates new socket in the transport entity when it requests for a connection.
B. It allocates the table space within the transport entity.
C. It is used for establishing the connection.
D. None of the above.
Answer» B. It allocates the table space within the transport entity.
62.

What is the use of ICMP protocol in the network?

A. It provides a mechanism for host and management queries.
B. There is no flow control and congestion control.
C. It doesn't provide error reporting mechanism.
D. All of the above
Answer» B. There is no flow control and congestion control.
63.

What is the use of LAN bridges in the network?

A. Provides real time and non real time services.
B. Checks the MAC address of source and destination.
C. Provides broadband ISDN for the data packets.
D. None of the above
Answer» C. Provides broadband ISDN for the data packets.
64.

What is the purpose of using pseudo header in UDP?

A. The data packets are delivered sequentially.
B. Find out the destination port number and source port number.
C. Sends the context of a particular internet destination address to UDP.
D. Verifying the UDP packet has reached its correct destination.
Answer» E.
65.

What is the full form of TFTP?

A. Transmission File Transport Protocol
B. Trivial File Transfer Protocol
C. Transport File Transfer Protocol
D. None of the above
Answer» C. Transport File Transfer Protocol
66.

What is the difference between Virtual Circuit and Datagram?

A. The quality of service is easy in Virtual Circuit while it is difficult in Datagram.
B. In the connection oriented service, a connection is called as Virtual Circuit while in the connectionless service, the independent packets are called
C. The services are independent in Virtual Circuit but that won't be so in Datagrams.
D. Both a and b
E. Both b and c
Answer» C. The services are independent in Virtual Circuit but that won't be so in Datagrams.
67.

What is the difference between TCP and UDP?

A. TCP guarantees that a packet will reach the destination without any duplication while UDP does not provide this guarantee.
B. The order of data will be same in TCP but that won't be so in UDP.
C. TCP is unreliable protocol but UDP is a reliable protocol.
D. Only a and b
E. Only b and c
Answer» E. Only b and c
68.

What is the difference between Token Ring and Ethernet?

A. Ethernet network interface cards cannot operate on a passive hub but Token ring can operate on a passive hub.
B. Ethernet does have an access for priority system but Token ring doesn't have any access for priority system on the token.
C. Ethernet supports a direct cable connection while Token ring doesn't support a direct cable connection as it requires additional hardware and software
D. Ethernet can support MAC address. Token ring cannot support MAC address.
Answer» D. Ethernet can support MAC address. Token ring cannot support MAC address.
69.

What is the difference between TDMA and CDMA?

A. In CDMA only one user is allowed to share a channel or sub channel . while it is allowed in TDMA.
B. CDMA offers higher transmission quality than TDMA.
C. CDMA is a dominant technology in the wireless market than TDMA.
D. Both a and b
E. Both b and c
Answer» C. CDMA is a dominant technology in the wireless market than TDMA.
70.

What is the difference between MPLS and Virtual Circuit?

A. The forwarding table is mostly used in MPLS but not in Virtual Circuit.
B. The forwarding table is not constructed in Virtual Circuit but it is constructed in MPLS.
C. In virtual-circuit, the user establishes new connection and launches a set up packet and created the path while there is no set up for each connection
D. All of the above.
Answer» D. All of the above.
71.

What is the difference between IPv4 and IPv6?

A. The IPv4 address is written in hexadecimal value while the IPv6 address is written by dotted-decimal notation.
B. In IPV4 source and destination address is 128 bits while in IPv6 it is 32 bits.
C. The IPv4 node has only stateful auto-configuration while the IPv6 node has both a stateful and a stateless address auto-configuration.
D. In IPv4 the IPsec support is required while in IPv6 it is optional.
Answer» D. In IPv4 the IPsec support is required while in IPv6 it is optional.
72.

What is the difference between IP and ICMP?

A. IP is a reliable protocol while ICMP is an unreliable protocol.
B. In IP, error checking and control are not concerns while in ICMP it concerns.
C. IP provides assistance mechanisms while ICMP doesn't provide assistance mechanisms.
D. None of the above.
Answer» C. IP provides assistance mechanisms while ICMP doesn't provide assistance mechanisms.
73.

What is the difference between Delay and Jitter?

A. Delay takes less time for buffering while jitter takes more time for buffering.
B. Delay is defined as the end to end time required for the signal to travel from transmitter to receiver and Jitter is defined as the variation of delay
C. Time delay is a variable in delay but not in jitter.
D. All of the above
Answer» C. Time delay is a variable in delay but not in jitter.
74.

What is the difference between Class based QoS and Flow based QoS?

A. Class based QoS does not provide flexible service differentiation. Flow based QoS provide flexible service differentiation.
B. Class based QoS is a perception of users and it is more important than Flow based while Flow based QoS is not more important than class based.
C. Both a and b
D. None of the above.
Answer» B. Class based QoS is a perception of users and it is more important than Flow based while Flow based QoS is not more important than class based.
75.

What is the difference between forwarding and routing?

A. Forwarding does not transmit data on outgoing links, but routing does.
B. Forwarding finds suitable path for a packet than routing.
C. Forwarding is a part of decision making while routing is not.
D. Forwarding is used in telephony while routing is used in all networks.
Answer» E.
76.

What is the default port of HTTP?

A. 20
B. 101
C. 80
D. 60
Answer» D. 60
77.

What is the default port of SMTP?

A. 85
B. 70
C. 80
D. 25
Answer» E.
78.

What is Quality of Service?

A. It is the capability of a network to provide better service to selected network traffic over various technologies.
B. It is a priority network that provides dedicated bandwidth, controlled jitter and latency.
C. Both a and b
D. None of the above
Answer» D. None of the above
79.

What is Packetizing?

A. It is a process of dividing a long message into smaller ones.
B. It is a process of encapsulating the packets into the data fields of the transport layer packet.
C. It is a process of an adding headers to each packet to allow the transport layer for performing its other functions.
D. All of the above.
Answer» E.
80.

What is Frame Check Sequence (FCS)?

A. FCS is an error recovery process.
B. FCS is an upper layer data.
C. FCS is an error detecting code.
D. FCS is a communication protocol.
Answer» D. FCS is a communication protocol.
81.

What is a path vector routing?

A. network routing protocol
B. inter-domain routing
C. exterior gateway protocol
D. None of the above
Answer» B. inter-domain routing
82.

What does the Link Control Protocol (LCP) do in PPP?

A. Set-up configure
B. Maintaining a link
C. Terminating a link
D. Both b and c
E. All of the above
Answer» F.
83.

Three way handshake technique in TCP is used __________.

A. to indicate the problems.
B. to solve the problem of delayed duplicate packet.
C. for data transmission
D. all of the above
Answer» C. for data transmission
84.

The protocol which is used for defining the legal request and replies is called ______ .

A. FTP
B. SMTP
C. TCP
D. HTTP
Answer» E.
85.

The connection oriented service is a dedicated connection between the users before the data is exchanged.

A. True
B. False
Answer» B. False
86.

The communication structure that we need in socket programming is called as _________.

A. System calls
B. Socket
C. Procedure
D. Table space
Answer» C. Procedure
87.

OSPF stands for _______ .

A. Object Service Priority First
B. Open Shortest Path First
C. Open Space Preservation Fund
D. Ocular Sun Protective Factor
Answer» C. Open Space Preservation Fund
88.

If all the links on the internet provide reliable delivery services, then will this TCP delivery service be redundant?

A. Yes
B. No
Answer» C.
89.

ICMP stands for ______________ .

A. Internet Component Mail Protocol
B. Internet Control Mail Protocol
C. Information Component Mail Protocol
D. Internet Control Message Protocol
Answer» E.
90.

How many layers are used in Hybrid model?

A. 7
B. 3
C. 5
D. 4
Answer» D. 4
91.

HDLC is developed by ________ .

A. ISI
B. ISO
C. FPO
D. ITC
Answer» C. FPO
92.

Ethernet is a multi-access network and most successful local area networking technology.

A. True
B. False
Answer» B. False
93.

Differential Manchester encoding is also known as ___________ .

A. Clock Signals
B. Condition Diphase encoding
C. Bipolar encoding
D. Biphase mark code
Answer» C. Bipolar encoding
94.

Data transfer is _______ in FTP.

A. efficient
B. reliable
C. secure
D. unreliable
Answer» C. secure
95.

Consider the following types, I. Destination unreachable II. Source quench III. Query Messages IV. Time exceeded V . Redirection In the above, which is/are the error reporting types?

A. I, II, III
B. I, II, IV, V
C. III, IV, V
D. III, II, IV, V
Answer» C. III, IV, V
96.

Consider the following things which RSVP cannot do in the network?

A. It doesn’t specify the exactly reservation of the bandwidth.
B. It is not a routing protocol.
C. It does not perform any signaling operation.
D. All of the above.
Answer» E.
97.

Consider the following features, I. Load Balancing II. Security III. Easy to configure IV. Supports authentication What is/are the features of OSPF?

A. II, IV
B. II, III
C. I, II, IV
D. I, II, III
Answer» D. I, II, III
98.

Connection-oriented is a _______ connection.

A. secure
B. virtual
C. stable
D. reliable
Answer» C. stable
99.

Cluster is a group of ___________ .

A. regions
B. zones
C. resources.
D. parameters
Answer» B. zones
100.

Both HDLC and PPP are data link layer protocols.

A. True
B. False
Answer» B. False