Explore topic-wise MCQs in Computer Science Mcqs.

This section includes 109 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Mcqs knowledge and support exam preparation. Choose a topic below to get started.

1.

Why was the Ipv6 protocol introduced?

A. IP security
B. Better Quality of Service support
C. Larger address space (128-bit in Ipv6, compared to the 32-bit address space in Ipv4)
D. All of the above
Answer» E.
2.

Abbreviate SMTP

A. Simple Mail Transport Protocol
B. Single Mail Transfer Protocol
C. Simple Mail Transfer Protocol
D. Single Mail Transport Protocol
Answer» D. Single Mail Transport Protocol
3.

Which of the following methods is/are used in Message switching?

A. Store and Forward
B. Switch to Switch
C. Both a and b
D. None of the above
Answer» D. None of the above
4.

What is the difference between Class based QoS and Flow based QoS?

A. Class based QoS does not provide flexible service differentiation. Flow based QoS provide flexible service differentiation.
B. Class based QoS is a perception of users and it is more important than Flow based while Flow based QoS is not more important than class based.
C. Both a and b
D. None of the above.
Answer» B. Class based QoS is a perception of users and it is more important than Flow based while Flow based QoS is not more important than class based.
5.

Which type of addressing scheme is used in Message switching?

A. Hierarchical addresses
B. Geographical addresses
C. Manual addresses
D. All of the above
Answer» C. Manual addresses
6.

Which information form/type is used for transferring the data in Packet switching?

A. Morse
B. ASCII
C. Binary
D. Baudot
Answer» D. Baudot
7.

Which of the following methods is/are used in Packet switching?

A. Datagram Packet Switching
B. Virtual-circuit Packet Switching
C. Both a and b
D. None of the above
Answer» D. None of the above
8.

Which connection does the OSI model support in networking?

A. Connection-oriented
B. Connectionless
C. Both a and b
D. None of the above
Answer» D. None of the above
9.

How many layers are there in OSI model?

A. 7
B. 3
C. 5
D. 4
Answer» B. 3
10.

Which of the following fundamental model helps to know the key problems for the designers of distributed system?

A. OSI model
B. Hybrid model
C. TCP/IP model
D. All of the above
Answer» E.
11.

What is/are the advantages of the OSI model?

A. The OSI model is not a truly general model.
B. The protocols are hidden in the OSI model so they can easily replaced by new protocols when the technology changes
C. Both a and b
D. None of the above
Answer» C. Both a and b
12.

Which queue operation is used for holding the packets in Leaky Bucket implementation?

A. LIFO
B. FILO
C. FIFO
D. All of the above
Answer» D. All of the above
13.

What kind of task does the Leaky Bucket algorithm do in traffic shaping technique?

A. Control congestion in network traffic.
B. Working on routing protocol.
C. Data flow control.
D. None of the above
Answer» B. Working on routing protocol.
14.

Which of the following statements is/are true about Traffic shaping?

A. It is an open loop control.
B. It will not regulate the average rate of data transmission.
C. It is also known as traffic policing.
D. All of the above.
Answer» B. It will not regulate the average rate of data transmission.
15.

Which of the following policies is/are related to Network layer?

A. Window policy
B. Traffic shaping
C. Traffic policing
D. Packet services
Answer» E.
16.

What kind of task does the Token Bucket Algorithm do on the network?

A. Drops data packets.
B. Allows for varying output rates.
C. Give low priority to the data packets.
D. Doesn't manage the queue regulator.
Answer» C. Give low priority to the data packets.
17.

Which algorithm is best for use in TCP congestion avoidance?

A. MIMD
B. AIAD
C. Both a and b
D. AlMD
Answer» E.
18.

What is/are the parameters of Quality of Service?

A. Connection establishment delay
B. Connection establishment failure probability
C. Protection and Priority
D. All of the above
E. None of the above
Answer» E. None of the above
19.

What is the difference between TCP and UDP?

A. TCP guarantees that a packet will reach the destination without any duplication while UDP does not provide this guarantee.
B. The order of data will be same in TCP but that won't be so in UDP.
C. TCP is unreliable protocol but UDP is a reliable protocol.
D. Only a and b
E. Only b and c
Answer» E. Only b and c
20.

Which of the following congestion control will not give converge in TCP congestion avoidance?

A. MIMD
B. AIAD
C. Both a and b
D. AIMD
Answer» D. AIMD
21.

What is the difference between IPv4 and IPv6?

A. The IPv4 address is written in hexadecimal value while the IPv6 address is written by dotted-decimal notation.
B. In IPV4 source and destination address is 128 bits while in IPv6 it is 32 bits.
C. The IPv4 node has only stateful auto-configuration while the IPv6 node has both a stateful and a stateless address auto-configuration.
D. In IPv4 the IPsec support is required while in IPv6 it is optional.
Answer» D. In IPv4 the IPsec support is required while in IPv6 it is optional.
22.

Which of the following statements is/are true if the transport layer is removed from the TCP/IP protocol stack?

A. Flow control will be handled
B. Data transfer will be reliable.
C. Byte stream won't be transferred to another machine.
D. None of the above
Answer» D. None of the above
23.

What is Packetizing?

A. It is a process of dividing a long message into smaller ones.
B. It is a process of encapsulating the packets into the data fields of the transport layer packet.
C. It is a process of an adding headers to each packet to allow the transport layer for performing its other functions.
D. All of the above.
Answer» E.
24.

If all the links on the internet provide reliable delivery services, then will this TCP delivery service be redundant?

A. Yes
B. No
Answer» C.
25.

Abbreviate RSVP

A. Resource Service Virtual Protocol
B. Resource Reservation Protocol
C. Receiver Service Virtual Protocol
D. Receiver Reservation Protocol
Answer» C. Receiver Service Virtual Protocol
26.

Consider the following things which RSVP cannot do in the network?

A. It doesn’t specify the exactly reservation of the bandwidth.
B. It is not a routing protocol.
C. It does not perform any signaling operation.
D. All of the above.
Answer» E.
27.

What is/are the characteristics of RSVP?

A. It doesn’t provide reservations for bandwidth in multicast trees.
B. It is a receiver oriented.
C. Both a and b
D. None of the above
Answer» C. Both a and b
28.

Which of the following statements is/are not correct about Leaky Bucket Algorithm?

A. It is a bucket with a hole at bottom.
B. Packets are never lost.
C. A variant on the leaky bucket is the token bucket.
D. Leaky bucket doesn't have the finite queue length.
Answer» E.
29.

Which of the following is true about Domain Name System (DNS)?

A. DNS is the client server application.
B. It uses alias names for identifying the sender and receiver instead of an IP address. So the alias address has to be mapped to the IP address.
C. It identifies sender and receiver so they should be known to each other.
D. All of the above.
Answer» E.
30.

Which of the following statements is/are not true about Persistent HTTP?

A. TCP connection is closed after the interval timeout by the http server.
B. The new connection is established and maintained for each request object.
C. Persistent will use HTTP version 1.1.
D. None of the above
Answer» B. The new connection is established and maintained for each request object.
31.

Connection-oriented is a _______ connection.

A. secure
B. virtual
C. stable
D. reliable
Answer» C. stable
32.

What is the default port of HTTP?

A. 20
B. 101
C. 80
D. 60
Answer» D. 60
33.

The connection oriented service is a dedicated connection between the users before the data is exchanged.

A. True
B. False
Answer» B. False
34.

Which of the following is/are the advantages of connection-oriented networking

A. Quality of service
B. No Priority service
C. Bandwidth utilization
D. All of the above
Answer» E.
35.

Which of the following statements is/are correct about Non Persistent HTTP?

A. Non Persistent HTTP connection is also called as HTTP keep-alive.
B. All the requests and responses between client and server can be sent over the same connection.
C. Non persistent uses HTTP version 2.0
D. All of the above
Answer» C. Non persistent uses HTTP version 2.0
36.

Which of the following statements is/are not true for connection-oriented network?

A. It doesn't give guarantee of service.
B. It takes less time for sending the packets.
C. Utilization of resources is good.
D. Both a and c
E. All of the above
Answer» F.
37.

Which of the following statements is/are true for connectionless network?

A. Not required so much information for storing
B. No need to established a connection.
C. Randomly packets distributed.
D. All of the above.
E. None of the above.
Answer» E. None of the above.
38.

What is the full form of TFTP?

A. Transmission File Transport Protocol
B. Trivial File Transfer Protocol
C. Transport File Transfer Protocol
D. None of the above
Answer» C. Transport File Transfer Protocol
39.

What is/are the advantages of Data link layer?

A. Data link is not required for the effective exchange of data between source and destination.
B. Provide services to the session layer.
C. The errors can be detected and corrected during the transmission of data from source to destination.
D. All of the above.
Answer» D. All of the above.
40.

Which protocol does TFTP use while working on the network?

A. ARP
B. FTP
C. UDP
D. TCP
Answer» D. TCP
41.

Authentication is done in FTP while in TFTP it cannot be done.

A. True
B. False
Answer» B. False
42.

What kind of task does MIME do in the SMTP protocol?

A. It only transfers the email and not receive them.
B. It transfers a message from the SMTP sender to the SMTP receiver over a TCP/IP.
C. It works under the Mail Transfer Agent (MAT).
D. It encodes the binary files and send.
Answer» E.
43.

Data transfer is _______ in FTP.

A. efficient
B. reliable
C. secure
D. unreliable
Answer» C. secure
44.

What is the difference between IP and ICMP?

A. IP is a reliable protocol while ICMP is an unreliable protocol.
B. In IP, error checking and control are not concerns while in ICMP it concerns.
C. IP provides assistance mechanisms while ICMP doesn't provide assistance mechanisms.
D. None of the above.
Answer» C. IP provides assistance mechanisms while ICMP doesn't provide assistance mechanisms.
45.

Which protocol does FTP use for transferring the files in the network?

A. UDP
B. TCP
C. ICMP
D. ARP
Answer» C. ICMP
46.

Three way handshake technique in TCP is used __________.

A. to indicate the problems.
B. to solve the problem of delayed duplicate packet.
C. for data transmission
D. all of the above
Answer» C. for data transmission
47.

The protocol which is used for defining the legal request and replies is called ______ .

A. FTP
B. SMTP
C. TCP
D. HTTP
Answer» E.
48.

What is the difference between Virtual Circuit and Datagram?

A. The quality of service is easy in Virtual Circuit while it is difficult in Datagram.
B. In the connection oriented service, a connection is called as Virtual Circuit while in the connectionless service, the independent packets are called
C. The services are independent in Virtual Circuit but that won't be so in Datagrams.
D. Both a and b
E. Both b and c
Answer» C. The services are independent in Virtual Circuit but that won't be so in Datagrams.
49.

What is the use of ICMP protocol in the network?

A. It provides a mechanism for host and management queries.
B. There is no flow control and congestion control.
C. It doesn't provide error reporting mechanism.
D. All of the above
Answer» B. There is no flow control and congestion control.
50.

What is/are the advantages of the TCP/IP?

A. TCP/IP provides reliable communication across the internet.
B. Information on the internet is carried in packets.
C. TCP/IP is a robust and scalable network.
D. All of the above.
Answer» E.