153
73.9k

310+ Computer Architecture and Organization Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) .

101.

What is autonegotiation?

A. a procedure by which two connected devices choose common transmission parameters
B. a security algorithm
C. a routing algorithm
D. encryption algorithm
Answer» A. a procedure by which two connected devices choose common transmission parameters
Explanation: autonegotiation is a procedure by which two connected devices choose common transmission parameters. it is a signaling mechanism used in ethernet over twisted pair cables.
102.

Ethernet in metropolitan area network (MAN) can be used as                        

A. pure ethernet
B. ethernet over sdh
C. ethernet over mpls
D. all of the mentioned
Answer» D. all of the mentioned
Explanation: a metropolitan area network (man) that is based on ethernet standards is called an ethernet man. it is commonly used to connect nodes to the internet. businesses also use ethernet mans to connect their own offices to each other.
103.

A point-to-point protocol over ethernet is a network protocol for                      

A. encapsulating ppp frames inside ethernet frames
B. encapsulating ehternet framse inside ppp frames
C. for security of ethernet frames
D. for security of ppp frames
Answer» A. encapsulating ppp frames inside ethernet frames
Explanation: ppoe or point-to-point protocol over ethernet was first introduced in 1999. it is popularly used by modern day internet service providers for dial-up connectivity.
104.

High speed ethernet works on                    

A. coaxial cable
B. twisted pair cable
C. optical fiber
D. unshielded twisted pair cable
Answer» C. optical fiber
Explanation: fast ethernet is mostly used in networks along with category 5 (cat-5) copper twisted-pair cable, but it also works with fiber-optic cable. based on the cable being used, there can be three types of fast ethernet.
105.

The maximum size of payload field in ethernet frame is                      

A. 1000 bytes
B. 1200 bytes
C. 1300 bytes
D. 1500 bytes
Answer» D. 1500 bytes
Explanation: the minimum size of the payload field is 40 bytes and the maximum size is 1500 bytes. if the payload size exceeds 1500 bytes, the frame is called a jumbo frame.
106.

What is interframe gap?

A. idle time between frames
B. idle time between frame bits
C. idle time between packets
D. idle time between networks
Answer» A. idle time between frames
Explanation: the inter-frame gap is the idle time for the receiver between the incoming frame flow. the inter-frame gap must be as low as possible for idle connections.
107.

An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called                

A. short frame
B. runt frame
C. mini frame
D. man frame
Answer» B. runt frame
Explanation: an ethernet frame that is less than the ieee 802.3 minimum length of 64 octets is called a runt frame. such frames are a result of collisions or software malfunctions.
108.

In wireless ad-hoc network                    

A. access point is not required
B. access point is must
C. nodes are not required
D. all nodes are access points
Answer» A. access point is not required
Explanation: an ad-hoc wireless network is a decentralized kind of a wireless network. an access point is usually a central device and it would go against the rules of the ad- hoc network to use one. hence it is not required.
109.

Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?

A. cdma
B. csma/ca
C. aloha
D. csma/cd
Answer» B. csma/ca
Explanation: csma/ca stands for carrier- sense multiple access/collision avoidance. it is a multiple access protocol used by ieee
110.

A wireless network interface controller can work in                

A. infrastructure mode
B. ad-hoc mode
C. both infrastructure mode and ad-hoc mode
D. wds mode
Answer» C. both infrastructure mode and ad-hoc mode
Explanation: a wireless network interface controller works on the physical layer and the data link layer of the osi model.
111.

In wireless network an extended service set is a set of                  

A. connected basic service sets
B. all stations
C. all access points
D. connected access points
Answer» A. connected basic service sets
Explanation: the extended service set is a part of the ieee 802.11 wlan architecture and is used to expand the range of the basic service set by allowing connection of multiple basic service sets.
112.

Mostly                  is used in wireless LAN.

A. time division multiplexing
B. orthogonal frequency division multiplexing
C. space division multiplexing
D. channel division multiplexing
Answer» B. orthogonal frequency division multiplexing
Explanation: in orthogonal frequency division multiplexing, digital data is encoded on multiple carrier frequencies. it is also used in digital television and audio broadcasting in addition to wireless lans.
113.

Which one of the following event is not possible in wireless LAN?

A. collision detection
B. acknowledgement of data frames
C. multi-mode data transmission
D. connection to wired networks
Answer» A. collision detection
Explanation: collision detection is not possible in wireless lan with no extensions. collision detection techniques for multiple access like csma/cd are used to detect collisions in wireless lans.
114.

What is Wired Equivalent Privacy (WEP)?

A. security algorithm for ethernet
B. security algorithm for wireless networks
C. security algorithm for usb communication
D. security algorithm for emails
Answer» B. security algorithm for wireless networks
Explanation: wep is a security algorithm for wireless network which intended to provide data confidentiality comparable to that of traditional wired networks. it was introduced in 1997.
115.

What is WPA?

A. wi-fi protected access
B. wired protected access
C. wired process access
D. wi-fi process access
Answer» A. wi-fi protected access
Explanation: wpa or wifi protected access is a security protocol used to provide users and firms with strong data security and protection for their wireless networks (wifi) to give them confidence that only authorized users can access their network.
116.

The time required to transmit frame depends on

A. frame size
B. channel capacity
C. frame size & channel capacity
D. none of the mentioned
Answer» C. frame size & channel capacity
Explanation: the time to transmit frame is given by the ratio of frame size and channel capacity.
117.

Window given the number of

A. bytes
B. frames
C. bytes & frames
D. none of the mentioned
Answer» C. bytes & frames
Explanation: window gives the number of frames or bytes that can be in transit unacknowledged.
118.

Routing is

A. static
B. dynamic
C. static & dynamic
D. none of the mentioned
Answer» C. static & dynamic
Explanation: routing can be static and dynamic.
119.

Routing is performed only centrally.

A. true
B. false
Answer» A. true
Explanation: routing is performed centrally and also in fully distributed way.
120.

Which is connection oriented and which is connection-less?

A. datagrams, virtual circuits
B. virtual circuits, datagrams
C. datagrams
D. none of the mentioned
Answer» B. virtual circuits, datagrams
Explanation: datagram is connection-less and virtual circuits are connection oriented.
121.

Which uses UDP?

A. echo
B. time
C. domain name server
D. all of the mentioned
Answer» D. all of the mentioned
Explanation: the protocols using udp are echo, time, domain name server, network file system etc.
122.

Which uses TCP?

A. simple mail transfer protocol
B. simple network management protocol
C. simple mail transfer & network management protocol
D. none of the mentioned
Answer» A. simple mail transfer protocol
Explanation: some of the protocols using tcp are http, telnet, file transfer protocol, simple mail transfer protocol etc.
123.

Which tells about low level transmission and framing?

A. v series
B. x series
C. g series
D. q series
Answer» C. g series
Explanation: g series tells about level transmission, modulation and framing.
124.

Which tells about signalling?

A. v series
B. x series
C. g series
D. q series
Answer» D. q series
Explanation: q series tells about signalling.
125.

An interconnected collection of piconet is called                        

A. scatternet
B. micronet
C. mininet
D. multinet
Answer» A. scatternet
Explanation: piconet is the basic unit of a bluetooth system having a master node and upto seven active slave nodes. a collection of piconets is called scatternet and a slave node of a piconet may act as a master in a piconet that is part of the scatternet.
126.

Bluetooth is the wireless technology for

A. local area network
B. personal area network
C. metropolitan area network
D. wide area network
Answer» B. personal area network
Explanation: bluetooth is a wireless technology used to create a wireless personal area network for data transfer up to a distance
127.

Bluetooth uses                      

A. frequency hopping spread spectrum
B. orthogonal frequency division multiplexing
C. time division multiplexing
D. channel division multiplexing
Answer» A. frequency hopping spread spectrum
Explanation: frequency hopping spread spectrum is a method of transmitting radio signals by rapidly changing the carrier frequency and is controlled by the codes known to the sender and receiver only.
128.

Unauthorised access of information from a wireless device through a bluetooth connection is called                    

A. bluemaking
B. bluesnarfing
C. bluestring
D. bluescoping
Answer» B. bluesnarfing
Explanation: unauthorised access of information from a wireless device through a bluetooth connection is called bluesnarfing. it is done through exploiting the vulnerabilities of the bluetooth device to steal the transmitted information.
129.

What is A2DP (advanced audio distribution profile)?

A. a bluetooth profile for streaming audio
B. a bluetooth profile for streaming video
C. a bluetooth profile for security
D. a bluetooth profile for file management
Answer» A. a bluetooth profile for streaming audio
Explanation: a2dp stands for advanced audio distribution profile is a transfer standard use to transmit high definition audio through bluetooth. it is mainly used in bluetooth speakers and wireless headphones.
130.

Bluetooth supports                

A. point-to-point connections
B. point-to-multipoint connection
C. both point-to-point connections and point- to-multipoint connection
D. multipoint to point connection
Answer» C. both point-to-point connections and point- to-multipoint connection
Explanation: in bluetooth, each slave node communicates with the master of the piconet independently i.e. each master-slave connection is independent. the slave is not allowed to communicate with other slaves directly.
131.

A scatternet can have maximum

A. 10 piconets
B. 20 piconets
C. 30 piconets
D. 40 piconets
Answer» A. 10 piconets
Explanation: a scatternet can have maximum of 10 piconets and minimum of 2 piconets. to connect these piconets, a slave node of one piconet may act as a master in a piconet that is part of the scatternet.
132.

What is the access point (AP) in a wireless LAN?

A. device that allows wireless devices to connect to a wired network
B. wireless devices itself
C. both device that allows wireless devices to connect to a wired network and wireless devices itself
D. all the nodes in the network
Answer» A. device that allows wireless devices to connect to a wired network
Explanation: access point in a wireless network is any device that will allow the wireless devices to a wired network. a router is the best example of an access point.
133.

In wireless distribution system                      

A. multiple access point are inter-connected with each other
B. there is no access point
C. only one access point exists
D. access points are not required
Answer» A. multiple access point are inter-connected with each other
Explanation: a wireless distribution system allows the connection of multiple access points together. it is used to expand a wireless network to a larger network.
134.

Which protocol is used to link all the devices in the IoT?

A. tcp/ip
B. network
C. udp
D. http
Answer» A. tcp/ip
Explanation: the internet of thing is the global system of interconnected computer networks that use the internet protocol suite (tcp/ip) to link billions of devices worldwide.
135.

                 enables seamless integration of LoWPAN devices with internet leveraging.

A. ietf 6lowpan
B. ieft coap
C. rfid/nfc
D. ieee 802.15.4.lowpan
Answer» A. ietf 6lowpan
Explanation: ietf 6lowpan enables seamless integration of lowpan devices with internet leveraging ipv6 large address space and appln. layer protocol reuse.
136.

                 enables open application layer for constrained nodes.

A. ietf 6lowpan
B. ieft coap
C. rfid/nfc
D. ieee 802.15.4.lowpan
Answer» B. ieft coap
Explanation: ietf coap – open application
137.

                 tags, devices, smart phones useful in identification.

A. ietf 6lowpan
B. ieft coap
C. rfid/nfc
D. ieee 802.15.4.lowpan
Answer» C. rfid/nfc
Explanation: rfid/nfc – tags, devices, smart phones useful in product / object identification and gathering associated information.
138.

                 supports low energy radio operation.

A. ietf 6lowpan
B. ieft coap
C. rfid/nfc
D. bluetooth
Answer» D. bluetooth
Explanation: bluetooth smart devices support low energy radio operations like, heart rate monitors, blood glucose monitors suitable for health care and fitness etc.
139.

                 specification defining the PHY and MAC layer of low power devices.

A. ietf 6lowpan
B. ieft coap
C. rfid/nfc
D. ieee 802.15.4.lowpan
Answer» D. ieee 802.15.4.lowpan
Explanation: ieee 802.15.4.lowpan – specification defining the phy and mac layer of low power devices supporting 250 kb/s data rate, small packet size 127 bytes.
140.

                 is an application layer protocol for resource constrained devices.

A. coap
B. hmtp
C. mqtt
D. tcp/ip
Answer» A. coap
Explanation: coap is an application layer protocol (ietf draft) for resource constrained devices. adheres to the restful approach for managing the resources and support mapping to http.
141.

Adheres to                  approach for managing resources and support mapping to HTTP.

A. retful
B. iot
C. restful
D. restful
Answer» D. restful
Explanation: coap is an application layer protocol (ietf draft) for resource constrained devices. adheres to restful approach for managing resources and support mapping to http.
142.

                 resources are identified by Uniform Resource Identifiers.

A. coap
B. hmtp
C. mqtt
D. tcp/ip
Answer» A. coap
Explanation: coap is an application layer protocol (ietf draft) for resource constrained devices. adheres to restful approach for managing resources and support mapping to
143.

Which protocol interacts asynchronously over UDP?

A. hmtp
B. coap
C. mqtt
D. tcp/ip
Answer» B. coap
Explanation: coap is an application layer protocol (ietf draft) for resource constrained devices. it is asynchronous message interactions over udp, request/response semantics coap resources are identified by uniform resource identifiers.
144.

CoAP messages are short.

A. true
B. false
Answer» A. true
Explanation: coap messages are short – 4 bytes header followed by options (typically, 10-20 bytes header).
145.

How many messages types are there in CoAP?

A. 2
B. 5
C. 3
D. 4
Answer» D. 4
Explanation: four message types are: confirmable
146.

Number of methods in CoAP?

A. 2
B. 5
C. 4
D. 3
Answer» C. 4
Explanation: four coap methods: get
147.

A 4 byte IP address consists of

A. wired sensor network                      
B. wireless sensor network
C. wired service network
D. wireless service network
Answer» B. wireless sensor network
Explanation: wsn – wireless sensor network comprises of motes running a wsn application and a light weight coap server.
148.

In virtual circuit network each packet contains                        

A. full source and destination address
B. a short vc number
C. only source address
D. only destination address
Answer» B. a short vc number
Explanation: a short vc number also called as vcid (virtual circuit identifier) is a type of identifier which is used to distinguish between several virtual circuits in a connection oriented circuit switched network. each virtual circuit is used to transfer data over a larger packet switched network.
149.

A subset of a network that includes all the routers but contains no loops is called

A. spanning tree
B. spider structure
C. spider tree
D. special tree
Answer» A. spanning tree
Explanation: spanning tree protocol (stp) is a network protocol that creates a loop free logical topology for ethernet networks. it is a layer 2 protocol that runs on bridges and switches. the main purpose of stp is to ensure that you do not create loops when you have redundant paths in your network.
150.

ICMP is primarily used for                      

A. error and diagnostic functions
B. addressing
C. forwarding
D. routing
Answer» A. error and diagnostic functions
Explanation: icmp abbreviation for internet control message protocol is used by networking devices to send error messages and operational information indicating a host or router cannot be reached. icmp operates over the ip packet to provide error reporting functionality as ip by itself cannot report errors.

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.