MCQOPTIONS
Saved Bookmarks
This section includes 109 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Mcqs knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Why was the Ipv6 protocol introduced? |
| A. | IP security |
| B. | Better Quality of Service support |
| C. | Larger address space (128-bit in Ipv6, compared to the 32-bit address space in Ipv4) |
| D. | All of the above |
| Answer» E. | |
| 2. |
Abbreviate SMTP |
| A. | Simple Mail Transport Protocol |
| B. | Single Mail Transfer Protocol |
| C. | Simple Mail Transfer Protocol |
| D. | Single Mail Transport Protocol |
| Answer» D. Single Mail Transport Protocol | |
| 3. |
Which of the following methods is/are used in Message switching? |
| A. | Store and Forward |
| B. | Switch to Switch |
| C. | Both a and b |
| D. | None of the above |
| Answer» D. None of the above | |
| 4. |
What is the difference between Class based QoS and Flow based QoS? |
| A. | Class based QoS does not provide flexible service differentiation. Flow based QoS provide flexible service differentiation. |
| B. | Class based QoS is a perception of users and it is more important than Flow based while Flow based QoS is not more important than class based. |
| C. | Both a and b |
| D. | None of the above. |
| Answer» B. Class based QoS is a perception of users and it is more important than Flow based while Flow based QoS is not more important than class based. | |
| 5. |
Which type of addressing scheme is used in Message switching? |
| A. | Hierarchical addresses |
| B. | Geographical addresses |
| C. | Manual addresses |
| D. | All of the above |
| Answer» C. Manual addresses | |
| 6. |
Which information form/type is used for transferring the data in Packet switching? |
| A. | Morse |
| B. | ASCII |
| C. | Binary |
| D. | Baudot |
| Answer» D. Baudot | |
| 7. |
Which of the following methods is/are used in Packet switching? |
| A. | Datagram Packet Switching |
| B. | Virtual-circuit Packet Switching |
| C. | Both a and b |
| D. | None of the above |
| Answer» D. None of the above | |
| 8. |
Which connection does the OSI model support in networking? |
| A. | Connection-oriented |
| B. | Connectionless |
| C. | Both a and b |
| D. | None of the above |
| Answer» D. None of the above | |
| 9. |
How many layers are there in OSI model? |
| A. | 7 |
| B. | 3 |
| C. | 5 |
| D. | 4 |
| Answer» B. 3 | |
| 10. |
Which of the following fundamental model helps to know the key problems for the designers of distributed system? |
| A. | OSI model |
| B. | Hybrid model |
| C. | TCP/IP model |
| D. | All of the above |
| Answer» E. | |
| 11. |
What is/are the advantages of the OSI model? |
| A. | The OSI model is not a truly general model. |
| B. | The protocols are hidden in the OSI model so they can easily replaced by new protocols when the technology changes |
| C. | Both a and b |
| D. | None of the above |
| Answer» C. Both a and b | |
| 12. |
Which queue operation is used for holding the packets in Leaky Bucket implementation? |
| A. | LIFO |
| B. | FILO |
| C. | FIFO |
| D. | All of the above |
| Answer» D. All of the above | |
| 13. |
What kind of task does the Leaky Bucket algorithm do in traffic shaping technique? |
| A. | Control congestion in network traffic. |
| B. | Working on routing protocol. |
| C. | Data flow control. |
| D. | None of the above |
| Answer» B. Working on routing protocol. | |
| 14. |
Which of the following statements is/are true about Traffic shaping? |
| A. | It is an open loop control. |
| B. | It will not regulate the average rate of data transmission. |
| C. | It is also known as traffic policing. |
| D. | All of the above. |
| Answer» B. It will not regulate the average rate of data transmission. | |
| 15. |
Which of the following policies is/are related to Network layer? |
| A. | Window policy |
| B. | Traffic shaping |
| C. | Traffic policing |
| D. | Packet services |
| Answer» E. | |
| 16. |
What kind of task does the Token Bucket Algorithm do on the network? |
| A. | Drops data packets. |
| B. | Allows for varying output rates. |
| C. | Give low priority to the data packets. |
| D. | Doesn't manage the queue regulator. |
| Answer» C. Give low priority to the data packets. | |
| 17. |
Which algorithm is best for use in TCP congestion avoidance? |
| A. | MIMD |
| B. | AIAD |
| C. | Both a and b |
| D. | AlMD |
| Answer» E. | |
| 18. |
What is/are the parameters of Quality of Service? |
| A. | Connection establishment delay |
| B. | Connection establishment failure probability |
| C. | Protection and Priority |
| D. | All of the above |
| E. | None of the above |
| Answer» E. None of the above | |
| 19. |
What is the difference between TCP and UDP? |
| A. | TCP guarantees that a packet will reach the destination without any duplication while UDP does not provide this guarantee. |
| B. | The order of data will be same in TCP but that won't be so in UDP. |
| C. | TCP is unreliable protocol but UDP is a reliable protocol. |
| D. | Only a and b |
| E. | Only b and c |
| Answer» E. Only b and c | |
| 20. |
Which of the following congestion control will not give converge in TCP congestion avoidance? |
| A. | MIMD |
| B. | AIAD |
| C. | Both a and b |
| D. | AIMD |
| Answer» D. AIMD | |
| 21. |
What is the difference between IPv4 and IPv6? |
| A. | The IPv4 address is written in hexadecimal value while the IPv6 address is written by dotted-decimal notation. |
| B. | In IPV4 source and destination address is 128 bits while in IPv6 it is 32 bits. |
| C. | The IPv4 node has only stateful auto-configuration while the IPv6 node has both a stateful and a stateless address auto-configuration. |
| D. | In IPv4 the IPsec support is required while in IPv6 it is optional. |
| Answer» D. In IPv4 the IPsec support is required while in IPv6 it is optional. | |
| 22. |
Which of the following statements is/are true if the transport layer is removed from the TCP/IP protocol stack? |
| A. | Flow control will be handled |
| B. | Data transfer will be reliable. |
| C. | Byte stream won't be transferred to another machine. |
| D. | None of the above |
| Answer» D. None of the above | |
| 23. |
What is Packetizing? |
| A. | It is a process of dividing a long message into smaller ones. |
| B. | It is a process of encapsulating the packets into the data fields of the transport layer packet. |
| C. | It is a process of an adding headers to each packet to allow the transport layer for performing its other functions. |
| D. | All of the above. |
| Answer» E. | |
| 24. |
If all the links on the internet provide reliable delivery services, then will this TCP delivery service be redundant? |
| A. | Yes |
| B. | No |
| Answer» C. | |
| 25. |
Abbreviate RSVP |
| A. | Resource Service Virtual Protocol |
| B. | Resource Reservation Protocol |
| C. | Receiver Service Virtual Protocol |
| D. | Receiver Reservation Protocol |
| Answer» C. Receiver Service Virtual Protocol | |
| 26. |
Consider the following things which RSVP cannot do in the network? |
| A. | It doesn’t specify the exactly reservation of the bandwidth. |
| B. | It is not a routing protocol. |
| C. | It does not perform any signaling operation. |
| D. | All of the above. |
| Answer» E. | |
| 27. |
What is/are the characteristics of RSVP? |
| A. | It doesn’t provide reservations for bandwidth in multicast trees. |
| B. | It is a receiver oriented. |
| C. | Both a and b |
| D. | None of the above |
| Answer» C. Both a and b | |
| 28. |
Which of the following statements is/are not correct about Leaky Bucket Algorithm? |
| A. | It is a bucket with a hole at bottom. |
| B. | Packets are never lost. |
| C. | A variant on the leaky bucket is the token bucket. |
| D. | Leaky bucket doesn't have the finite queue length. |
| Answer» E. | |
| 29. |
Which of the following is true about Domain Name System (DNS)? |
| A. | DNS is the client server application. |
| B. | It uses alias names for identifying the sender and receiver instead of an IP address. So the alias address has to be mapped to the IP address. |
| C. | It identifies sender and receiver so they should be known to each other. |
| D. | All of the above. |
| Answer» E. | |
| 30. |
Which of the following statements is/are not true about Persistent HTTP? |
| A. | TCP connection is closed after the interval timeout by the http server. |
| B. | The new connection is established and maintained for each request object. |
| C. | Persistent will use HTTP version 1.1. |
| D. | None of the above |
| Answer» B. The new connection is established and maintained for each request object. | |
| 31. |
Connection-oriented is a _______ connection. |
| A. | secure |
| B. | virtual |
| C. | stable |
| D. | reliable |
| Answer» C. stable | |
| 32. |
What is the default port of HTTP? |
| A. | 20 |
| B. | 101 |
| C. | 80 |
| D. | 60 |
| Answer» D. 60 | |
| 33. |
The connection oriented service is a dedicated connection between the users before the data is exchanged. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 34. |
Which of the following is/are the advantages of connection-oriented networking |
| A. | Quality of service |
| B. | No Priority service |
| C. | Bandwidth utilization |
| D. | All of the above |
| Answer» E. | |
| 35. |
Which of the following statements is/are correct about Non Persistent HTTP? |
| A. | Non Persistent HTTP connection is also called as HTTP keep-alive. |
| B. | All the requests and responses between client and server can be sent over the same connection. |
| C. | Non persistent uses HTTP version 2.0 |
| D. | All of the above |
| Answer» C. Non persistent uses HTTP version 2.0 | |
| 36. |
Which of the following statements is/are not true for connection-oriented network? |
| A. | It doesn't give guarantee of service. |
| B. | It takes less time for sending the packets. |
| C. | Utilization of resources is good. |
| D. | Both a and c |
| E. | All of the above |
| Answer» F. | |
| 37. |
Which of the following statements is/are true for connectionless network? |
| A. | Not required so much information for storing |
| B. | No need to established a connection. |
| C. | Randomly packets distributed. |
| D. | All of the above. |
| E. | None of the above. |
| Answer» E. None of the above. | |
| 38. |
What is the full form of TFTP? |
| A. | Transmission File Transport Protocol |
| B. | Trivial File Transfer Protocol |
| C. | Transport File Transfer Protocol |
| D. | None of the above |
| Answer» C. Transport File Transfer Protocol | |
| 39. |
What is/are the advantages of Data link layer? |
| A. | Data link is not required for the effective exchange of data between source and destination. |
| B. | Provide services to the session layer. |
| C. | The errors can be detected and corrected during the transmission of data from source to destination. |
| D. | All of the above. |
| Answer» D. All of the above. | |
| 40. |
Which protocol does TFTP use while working on the network? |
| A. | ARP |
| B. | FTP |
| C. | UDP |
| D. | TCP |
| Answer» D. TCP | |
| 41. |
Authentication is done in FTP while in TFTP it cannot be done. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 42. |
What kind of task does MIME do in the SMTP protocol? |
| A. | It only transfers the email and not receive them. |
| B. | It transfers a message from the SMTP sender to the SMTP receiver over a TCP/IP. |
| C. | It works under the Mail Transfer Agent (MAT). |
| D. | It encodes the binary files and send. |
| Answer» E. | |
| 43. |
Data transfer is _______ in FTP. |
| A. | efficient |
| B. | reliable |
| C. | secure |
| D. | unreliable |
| Answer» C. secure | |
| 44. |
What is the difference between IP and ICMP? |
| A. | IP is a reliable protocol while ICMP is an unreliable protocol. |
| B. | In IP, error checking and control are not concerns while in ICMP it concerns. |
| C. | IP provides assistance mechanisms while ICMP doesn't provide assistance mechanisms. |
| D. | None of the above. |
| Answer» C. IP provides assistance mechanisms while ICMP doesn't provide assistance mechanisms. | |
| 45. |
Which protocol does FTP use for transferring the files in the network? |
| A. | UDP |
| B. | TCP |
| C. | ICMP |
| D. | ARP |
| Answer» C. ICMP | |
| 46. |
Three way handshake technique in TCP is used __________. |
| A. | to indicate the problems. |
| B. | to solve the problem of delayed duplicate packet. |
| C. | for data transmission |
| D. | all of the above |
| Answer» C. for data transmission | |
| 47. |
The protocol which is used for defining the legal request and replies is called ______ . |
| A. | FTP |
| B. | SMTP |
| C. | TCP |
| D. | HTTP |
| Answer» E. | |
| 48. |
What is the difference between Virtual Circuit and Datagram? |
| A. | The quality of service is easy in Virtual Circuit while it is difficult in Datagram. |
| B. | In the connection oriented service, a connection is called as Virtual Circuit while in the connectionless service, the independent packets are called |
| C. | The services are independent in Virtual Circuit but that won't be so in Datagrams. |
| D. | Both a and b |
| E. | Both b and c |
| Answer» C. The services are independent in Virtual Circuit but that won't be so in Datagrams. | |
| 49. |
What is the use of ICMP protocol in the network? |
| A. | It provides a mechanism for host and management queries. |
| B. | There is no flow control and congestion control. |
| C. | It doesn't provide error reporting mechanism. |
| D. | All of the above |
| Answer» B. There is no flow control and congestion control. | |
| 50. |
What is/are the advantages of the TCP/IP? |
| A. | TCP/IP provides reliable communication across the internet. |
| B. | Information on the internet is carried in packets. |
| C. | TCP/IP is a robust and scalable network. |
| D. | All of the above. |
| Answer» E. | |