

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) .
101. |
What is autonegotiation? |
A. | a procedure by which two connected devices choose common transmission parameters |
B. | a security algorithm |
C. | a routing algorithm |
D. | encryption algorithm |
Answer» A. a procedure by which two connected devices choose common transmission parameters | |
Explanation: autonegotiation is a procedure by which two connected devices choose common transmission parameters. it is a signaling mechanism used in ethernet over twisted pair cables. |
102. |
Ethernet in metropolitan area network (MAN) can be used as |
A. | pure ethernet |
B. | ethernet over sdh |
C. | ethernet over mpls |
D. | all of the mentioned |
Answer» D. all of the mentioned | |
Explanation: a metropolitan area network (man) that is based on ethernet standards is called an ethernet man. it is commonly used to connect nodes to the internet. businesses also use ethernet mans to connect their own offices to each other. |
103. |
A point-to-point protocol over ethernet is a network protocol for |
A. | encapsulating ppp frames inside ethernet frames |
B. | encapsulating ehternet framse inside ppp frames |
C. | for security of ethernet frames |
D. | for security of ppp frames |
Answer» A. encapsulating ppp frames inside ethernet frames | |
Explanation: ppoe or point-to-point protocol over ethernet was first introduced in 1999. it is popularly used by modern day internet service providers for dial-up connectivity. |
104. |
High speed ethernet works on |
A. | coaxial cable |
B. | twisted pair cable |
C. | optical fiber |
D. | unshielded twisted pair cable |
Answer» C. optical fiber | |
Explanation: fast ethernet is mostly used in networks along with category 5 (cat-5) copper twisted-pair cable, but it also works with fiber-optic cable. based on the cable being used, there can be three types of fast ethernet. |
105. |
The maximum size of payload field in ethernet frame is |
A. | 1000 bytes |
B. | 1200 bytes |
C. | 1300 bytes |
D. | 1500 bytes |
Answer» D. 1500 bytes | |
Explanation: the minimum size of the payload field is 40 bytes and the maximum size is 1500 bytes. if the payload size exceeds 1500 bytes, the frame is called a jumbo frame. |
106. |
What is interframe gap? |
A. | idle time between frames |
B. | idle time between frame bits |
C. | idle time between packets |
D. | idle time between networks |
Answer» A. idle time between frames | |
Explanation: the inter-frame gap is the idle time for the receiver between the incoming frame flow. the inter-frame gap must be as low as possible for idle connections. |
107. |
An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called |
A. | short frame |
B. | runt frame |
C. | mini frame |
D. | man frame |
Answer» B. runt frame | |
Explanation: an ethernet frame that is less than the ieee 802.3 minimum length of 64 octets is called a runt frame. such frames are a result of collisions or software malfunctions. |
108. |
In wireless ad-hoc network |
A. | access point is not required |
B. | access point is must |
C. | nodes are not required |
D. | all nodes are access points |
Answer» A. access point is not required | |
Explanation: an ad-hoc wireless network is a decentralized kind of a wireless network. an access point is usually a central device and it would go against the rules of the ad- hoc network to use one. hence it is not required. |
109. |
Which multiple access technique is used by IEEE 802.11 standard for wireless LAN? |
A. | cdma |
B. | csma/ca |
C. | aloha |
D. | csma/cd |
Answer» B. csma/ca | |
Explanation: csma/ca stands for carrier- sense multiple access/collision avoidance. it is a multiple access protocol used by ieee |
110. |
A wireless network interface controller can work in |
A. | infrastructure mode |
B. | ad-hoc mode |
C. | both infrastructure mode and ad-hoc mode |
D. | wds mode |
Answer» C. both infrastructure mode and ad-hoc mode | |
Explanation: a wireless network interface controller works on the physical layer and the data link layer of the osi model. |
111. |
In wireless network an extended service set is a set of |
A. | connected basic service sets |
B. | all stations |
C. | all access points |
D. | connected access points |
Answer» A. connected basic service sets | |
Explanation: the extended service set is a part of the ieee 802.11 wlan architecture and is used to expand the range of the basic service set by allowing connection of multiple basic service sets. |
112. |
Mostly is used in wireless LAN. |
A. | time division multiplexing |
B. | orthogonal frequency division multiplexing |
C. | space division multiplexing |
D. | channel division multiplexing |
Answer» B. orthogonal frequency division multiplexing | |
Explanation: in orthogonal frequency division multiplexing, digital data is encoded on multiple carrier frequencies. it is also used in digital television and audio broadcasting in addition to wireless lans. |
113. |
Which one of the following event is not possible in wireless LAN? |
A. | collision detection |
B. | acknowledgement of data frames |
C. | multi-mode data transmission |
D. | connection to wired networks |
Answer» A. collision detection | |
Explanation: collision detection is not possible in wireless lan with no extensions. collision detection techniques for multiple access like csma/cd are used to detect collisions in wireless lans. |
114. |
What is Wired Equivalent Privacy (WEP)? |
A. | security algorithm for ethernet |
B. | security algorithm for wireless networks |
C. | security algorithm for usb communication |
D. | security algorithm for emails |
Answer» B. security algorithm for wireless networks | |
Explanation: wep is a security algorithm for wireless network which intended to provide data confidentiality comparable to that of traditional wired networks. it was introduced in 1997. |
115. |
What is WPA? |
A. | wi-fi protected access |
B. | wired protected access |
C. | wired process access |
D. | wi-fi process access |
Answer» A. wi-fi protected access | |
Explanation: wpa or wifi protected access is a security protocol used to provide users and firms with strong data security and protection for their wireless networks (wifi) to give them confidence that only authorized users can access their network. |
116. |
The time required to transmit frame depends on |
A. | frame size |
B. | channel capacity |
C. | frame size & channel capacity |
D. | none of the mentioned |
Answer» C. frame size & channel capacity | |
Explanation: the time to transmit frame is given by the ratio of frame size and channel capacity. |
117. |
Window given the number of |
A. | bytes |
B. | frames |
C. | bytes & frames |
D. | none of the mentioned |
Answer» C. bytes & frames | |
Explanation: window gives the number of frames or bytes that can be in transit unacknowledged. |
118. |
Routing is |
A. | static |
B. | dynamic |
C. | static & dynamic |
D. | none of the mentioned |
Answer» C. static & dynamic | |
Explanation: routing can be static and dynamic. |
119. |
Routing is performed only centrally. |
A. | true |
B. | false |
Answer» A. true | |
Explanation: routing is performed centrally and also in fully distributed way. |
120. |
Which is connection oriented and which is connection-less? |
A. | datagrams, virtual circuits |
B. | virtual circuits, datagrams |
C. | datagrams |
D. | none of the mentioned |
Answer» B. virtual circuits, datagrams | |
Explanation: datagram is connection-less and virtual circuits are connection oriented. |
121. |
Which uses UDP? |
A. | echo |
B. | time |
C. | domain name server |
D. | all of the mentioned |
Answer» D. all of the mentioned | |
Explanation: the protocols using udp are echo, time, domain name server, network file system etc. |
122. |
Which uses TCP? |
A. | simple mail transfer protocol |
B. | simple network management protocol |
C. | simple mail transfer & network management protocol |
D. | none of the mentioned |
Answer» A. simple mail transfer protocol | |
Explanation: some of the protocols using tcp are http, telnet, file transfer protocol, simple mail transfer protocol etc. |
123. |
Which tells about low level transmission and framing? |
A. | v series |
B. | x series |
C. | g series |
D. | q series |
Answer» C. g series | |
Explanation: g series tells about level transmission, modulation and framing. |
124. |
Which tells about signalling? |
A. | v series |
B. | x series |
C. | g series |
D. | q series |
Answer» D. q series | |
Explanation: q series tells about signalling. |
125. |
An interconnected collection of piconet is called |
A. | scatternet |
B. | micronet |
C. | mininet |
D. | multinet |
Answer» A. scatternet | |
Explanation: piconet is the basic unit of a bluetooth system having a master node and upto seven active slave nodes. a collection of piconets is called scatternet and a slave node of a piconet may act as a master in a piconet that is part of the scatternet. |
126. |
Bluetooth is the wireless technology for |
A. | local area network |
B. | personal area network |
C. | metropolitan area network |
D. | wide area network |
Answer» B. personal area network | |
Explanation: bluetooth is a wireless technology used to create a wireless personal area network for data transfer up to a distance |
127. |
Bluetooth uses |
A. | frequency hopping spread spectrum |
B. | orthogonal frequency division multiplexing |
C. | time division multiplexing |
D. | channel division multiplexing |
Answer» A. frequency hopping spread spectrum | |
Explanation: frequency hopping spread spectrum is a method of transmitting radio signals by rapidly changing the carrier frequency and is controlled by the codes known to the sender and receiver only. |
128. |
Unauthorised access of information from a wireless device through a bluetooth connection is called |
A. | bluemaking |
B. | bluesnarfing |
C. | bluestring |
D. | bluescoping |
Answer» B. bluesnarfing | |
Explanation: unauthorised access of information from a wireless device through a bluetooth connection is called bluesnarfing. it is done through exploiting the vulnerabilities of the bluetooth device to steal the transmitted information. |
129. |
What is A2DP (advanced audio distribution profile)? |
A. | a bluetooth profile for streaming audio |
B. | a bluetooth profile for streaming video |
C. | a bluetooth profile for security |
D. | a bluetooth profile for file management |
Answer» A. a bluetooth profile for streaming audio | |
Explanation: a2dp stands for advanced audio distribution profile is a transfer standard use to transmit high definition audio through bluetooth. it is mainly used in bluetooth speakers and wireless headphones. |
130. |
Bluetooth supports |
A. | point-to-point connections |
B. | point-to-multipoint connection |
C. | both point-to-point connections and point- to-multipoint connection |
D. | multipoint to point connection |
Answer» C. both point-to-point connections and point- to-multipoint connection | |
Explanation: in bluetooth, each slave node communicates with the master of the piconet independently i.e. each master-slave connection is independent. the slave is not allowed to communicate with other slaves directly. |
131. |
A scatternet can have maximum |
A. | 10 piconets |
B. | 20 piconets |
C. | 30 piconets |
D. | 40 piconets |
Answer» A. 10 piconets | |
Explanation: a scatternet can have maximum of 10 piconets and minimum of 2 piconets. to connect these piconets, a slave node of one piconet may act as a master in a piconet that is part of the scatternet. |
132. |
What is the access point (AP) in a wireless LAN? |
A. | device that allows wireless devices to connect to a wired network |
B. | wireless devices itself |
C. | both device that allows wireless devices to connect to a wired network and wireless devices itself |
D. | all the nodes in the network |
Answer» A. device that allows wireless devices to connect to a wired network | |
Explanation: access point in a wireless network is any device that will allow the wireless devices to a wired network. a router is the best example of an access point. |
133. |
In wireless distribution system |
A. | multiple access point are inter-connected with each other |
B. | there is no access point |
C. | only one access point exists |
D. | access points are not required |
Answer» A. multiple access point are inter-connected with each other | |
Explanation: a wireless distribution system allows the connection of multiple access points together. it is used to expand a wireless network to a larger network. |
134. |
Which protocol is used to link all the devices in the IoT? |
A. | tcp/ip |
B. | network |
C. | udp |
D. | http |
Answer» A. tcp/ip | |
Explanation: the internet of thing is the global system of interconnected computer networks that use the internet protocol suite (tcp/ip) to link billions of devices worldwide. |
135. |
enables seamless integration of LoWPAN devices with internet leveraging. |
A. | ietf 6lowpan |
B. | ieft coap |
C. | rfid/nfc |
D. | ieee 802.15.4.lowpan |
Answer» A. ietf 6lowpan | |
Explanation: ietf 6lowpan enables seamless integration of lowpan devices with internet leveraging ipv6 large address space and appln. layer protocol reuse. |
136. |
enables open application layer for constrained nodes. |
A. | ietf 6lowpan |
B. | ieft coap |
C. | rfid/nfc |
D. | ieee 802.15.4.lowpan |
Answer» B. ieft coap | |
Explanation: ietf coap – open application |
137. |
tags, devices, smart phones useful in identification. |
A. | ietf 6lowpan |
B. | ieft coap |
C. | rfid/nfc |
D. | ieee 802.15.4.lowpan |
Answer» C. rfid/nfc | |
Explanation: rfid/nfc – tags, devices, smart phones useful in product / object identification and gathering associated information. |
138. |
supports low energy radio operation. |
A. | ietf 6lowpan |
B. | ieft coap |
C. | rfid/nfc |
D. | bluetooth |
Answer» D. bluetooth | |
Explanation: bluetooth smart devices support low energy radio operations like, heart rate monitors, blood glucose monitors suitable for health care and fitness etc. |
139. |
specification defining the PHY and MAC layer of low power devices. |
A. | ietf 6lowpan |
B. | ieft coap |
C. | rfid/nfc |
D. | ieee 802.15.4.lowpan |
Answer» D. ieee 802.15.4.lowpan | |
Explanation: ieee 802.15.4.lowpan – specification defining the phy and mac layer of low power devices supporting 250 kb/s data rate, small packet size 127 bytes. |
140. |
is an application layer protocol for resource constrained devices. |
A. | coap |
B. | hmtp |
C. | mqtt |
D. | tcp/ip |
Answer» A. coap | |
Explanation: coap is an application layer protocol (ietf draft) for resource constrained devices. adheres to the restful approach for managing the resources and support mapping to http. |
141. |
Adheres to approach for managing resources and support mapping to HTTP. |
A. | retful |
B. | iot |
C. | restful |
D. | restful |
Answer» D. restful | |
Explanation: coap is an application layer protocol (ietf draft) for resource constrained devices. adheres to restful approach for managing resources and support mapping to http. |
142. |
resources are identified by Uniform Resource Identifiers. |
A. | coap |
B. | hmtp |
C. | mqtt |
D. | tcp/ip |
Answer» A. coap | |
Explanation: coap is an application layer protocol (ietf draft) for resource constrained devices. adheres to restful approach for managing resources and support mapping to |
143. |
Which protocol interacts asynchronously over UDP? |
A. | hmtp |
B. | coap |
C. | mqtt |
D. | tcp/ip |
Answer» B. coap | |
Explanation: coap is an application layer protocol (ietf draft) for resource constrained devices. it is asynchronous message interactions over udp, request/response semantics coap resources are identified by uniform resource identifiers. |
144. |
CoAP messages are short. |
A. | true |
B. | false |
Answer» A. true | |
Explanation: coap messages are short – 4 bytes header followed by options (typically, 10-20 bytes header). |
145. |
How many messages types are there in CoAP? |
A. | 2 |
B. | 5 |
C. | 3 |
D. | 4 |
Answer» D. 4 | |
Explanation: four message types are: confirmable |
146. |
Number of methods in CoAP? |
A. | 2 |
B. | 5 |
C. | 4 |
D. | 3 |
Answer» C. 4 | |
Explanation: four coap methods: get |
147. |
A 4 byte IP address consists of |
A. | wired sensor network |
B. | wireless sensor network |
C. | wired service network |
D. | wireless service network |
Answer» B. wireless sensor network | |
Explanation: wsn – wireless sensor network comprises of motes running a wsn application and a light weight coap server. |
148. |
In virtual circuit network each packet contains |
A. | full source and destination address |
B. | a short vc number |
C. | only source address |
D. | only destination address |
Answer» B. a short vc number | |
Explanation: a short vc number also called as vcid (virtual circuit identifier) is a type of identifier which is used to distinguish between several virtual circuits in a connection oriented circuit switched network. each virtual circuit is used to transfer data over a larger packet switched network. |
149. |
A subset of a network that includes all the routers but contains no loops is called |
A. | spanning tree |
B. | spider structure |
C. | spider tree |
D. | special tree |
Answer» A. spanning tree | |
Explanation: spanning tree protocol (stp) is a network protocol that creates a loop free logical topology for ethernet networks. it is a layer 2 protocol that runs on bridges and switches. the main purpose of stp is to ensure that you do not create loops when you have redundant paths in your network. |
150. |
ICMP is primarily used for |
A. | error and diagnostic functions |
B. | addressing |
C. | forwarding |
D. | routing |
Answer» A. error and diagnostic functions | |
Explanation: icmp abbreviation for internet control message protocol is used by networking devices to send error messages and operational information indicating a host or router cannot be reached. icmp operates over the ip packet to provide error reporting functionality as ip by itself cannot report errors. |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.