153
73.9k

310+ Computer Architecture and Organization Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) .

201.

Which of the following is not a type of OSPF packet?

A. hello
B. link-state request
C. link-state response
D. link-state ack
Answer» C. link-state response
Explanation: the five types of ospf packets are: hello, database description, link-state request, link-state update, and link-state ack. there is no link-state response packet; the neighbor router sends a link-state update packet as a response to the link-state request packet if there is an update in the routing table.
202.

In OSPF header, which field is used to detect errors in the packet?

A. type
B. area id
C. authentication type
D. checksum
Answer» D. checksum
Explanation: checksum field is used to detect errors. it makes sure that the data portions that are being sent are all in integrity. it can detect duplicated bits. once an error is detected, the sender has to re-transmit the data as it won’t receive an acknowledgement.
203.

In OSPF database descriptor packet, if there are more database descriptor packets in the flow, ‘M’ field is set to                          

A. 1
B. 0
C. more
D. -1
Answer» A. 1
Explanation: the “m” bit is the more bit, which indicates that there are more packets to be received in the descriptor packet flow whenever it is set to 1. there is also an “i” bit which indicates if the packet is first in the flow.
204.

In OSPF database descriptor packet, which field is used to indicate that the router is master?

A. m
B. ms
C. i
D. options
Answer» B. ms
Explanation: the ms bit is used to indicate if the origin of the packet is a master or a slave. if it is set to 1, the source of the packet is a master, and if it is set to 0, the source of the packet is a slave.
205.

In OSPF database descriptor packet, which field is used to detect a missing packet?

A. lsa header
B. ms
C. database descriptor sequence number
D. options
Answer» C. database descriptor sequence number
Explanation: sequence number field is used to detect a missing packet. the packets are to be received in order of the sequence number, so if the receiver detects that there is a sequence number skipped or missing in the order, it stops processing the further received packets and informs the sender to retransmit the packets in sequence.
206.

The size of an IP address in IPv6 is

A. 4 bytes
B. 128 bits
C. 8 bytes
D. 100 bits
Answer» B. 128 bits
Explanation: an ipv6 address is 128 bits long. therefore, 2128 i.e. 340 undecillion addresses are possible in ipv6. ipv4 has only 4 billion possible addresses and ipv6 would be a brilliant alternative in case ipv4 runs out of possible new addresses.
207.

The header length of an IPv6 datagram is

A. 10bytes
B. 25bytes
C. 30bytes
D. 40bytes
Answer» D. 40bytes
Explanation: ipv6 datagram has fixed header length of 40bytes, which results in faster processing of the datagram. there is one fixed header and optional headers which may or may not exist. the fixed header contains the mandatory essential information about the
208.

In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?

A. fragmentation field
B. fast-switching
C. tos field
D. option field
Answer» C. tos field
Explanation: the traffic class field is used to specify the priority of the ip packet which is a similar functionality to the type of service field in the ipv4 header. it’s an 8-bit field and its values are not defined in the rfc 2460.
209.

IPv6 does not use                    type of address.

A. broadcast
B. multicast
C. anycast
D. unicast
Answer» A. broadcast
Explanation: there is no concept of broadcast address in ipv6. instead, there is an anycast address in ipv6 which allows sending messages to a group of devices but not all devices in a network. anycast address is not standardized in ipv4.
210.

Which among the following features is

A. hop limit
B. ttl
C. next header
D. type of traffic
Answer» A. hop limit
Explanation: the hop limit value is decremented by one by a router when the datagram is forwarded by the router. when the value becomes zero the datagram is discarded. the field is 8-bits wide, so an ipv6 packet can live up to 255 router hops only.
211.

Dual-stack approach refers to                    

A. implementing ipv4 with 2 stacks
B. implementing ipv6 with 2 stacks
C. node has both ipv4 and ipv6 support
D. implementing a mac address with 2 stacks
Answer» C. node has both ipv4 and ipv6 support
Explanation: dual-stack is one of the approaches used to support ipv6 in already existing systems. isps are using it as a method to transfer from ipv4 to ipv6 completely eventually due to the lower number of possible available addresses in ipv4.
212.

The                    field determines the lifetime of IPv6 datagram

A. use dual-stack approach
B. tunneling
C. no solution
D. replace the system
Answer» B. tunneling
Explanation: the ipv4 routers can form a tunnel in which at the sender’s side, the ipv6 datagram is encapsulated in to ipv4, and at the receiver’s side of the tunnel, the ipv4 packet is stripped and the ipv6 packet is sent to the receiver.
213.

Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits              

A. 96 to 127
B. 0 to 63
C. 80 to 95
D. 64 to 79
Answer» A. 96 to 127
Explanation: teredo is a technique through which gives the possibility for full ipv6 network connectivity to ipv6 capable hosts which are currently on an ipv4 network. bits 96 to 127 in the datagram represents obfuscated 1pv4 address of the ipv4 network.
214.

An endpoint of an inter-process communication flow across a computer network is called                      

A. socket
B. pipe
C. port
D. machine
Answer» A. socket
Explanation: socket is one end point in a two way communication link in the network. tcp layer can identify the application that data is destined to be sent by using the port number that is bound to socket.
215.

Which one of the following is a version of UDP with congestion control?

A. datagram congestion control protocol
B. stream control transmission protocol
C. structured stream transport
D. user congestion control protocol
Answer» A. datagram congestion control protocol
Explanation: the datagram congestion control is a transport layer protocol which deals with reliable connection setup, teardown, congestion control, explicit congestion notification, and feature negotiation. it is used in modern day systems where there are really high chances of congestion. the protocol was last updated in the year 2008.
216.

Which of the following is a transport layer protocol?

A. stream control transmission protocol
B. internet control message protocol
C. neighbor discovery protocol
D. dynamic host configuration protocol
Answer» A. stream control transmission protocol
Explanation: the stream control transmission protocol (sctp) is a transport layer protocol used in networking system where streams of data are to be continuously transmitted between two connected network nodes. some of the other transport layer protocols are rdp, rudp, tcp, dccp, udp etc.
217.

2 USER DATAGRAM PROTOCOLS (UDP)

A. connection-oriented
B. unreliable
C. transport layer protocol
D. low overhead
Answer» A. connection-oriented
Explanation: udp is an unreliable, connectionless transport layer protocol that provides message-based data transmission. tcp is an example of connection-oriented protocols.
218.

Return value of the UDP port “Chargen” is

A. string of characters
B. string of integers
C. array of characters with integers
D. array of zero’s and one’s
Answer» A. string of characters
Explanation: using chargen with udp on port 19, the server sends a udp datagram containing a random number of characters every time it receives a datagram from the connecting host. the number of characters is between 0 and 512.
219.

Beyond IP, UDP provides additional services such as                

A. routing and switching
B. sending and receiving of packets
C. multiplexing and demultiplexing
D. demultiplexing and error checking
Answer» D. demultiplexing and error checking
Explanation: de-multiplexing is the delivering of received segments to the correct application layer processes at the recipients end using udp. error checking is done through checksum in udp.
220.

What is the main advantage of UDP?

A. more overload
B. reliable
C. low overhead
D. fast
Answer» C. low overhead
Explanation: as udp does not provide assurance of delivery of packet, reliability and other services, the overhead taken to provide these services is reduced in udp’s operation. thus, udp provides low overhead, and higher speed.
221.

What is the header size of a UDP packet?

A. 8 bytes
B. 8 bits
C. 16 bytes
D. 124 bytes
Answer» A. 8 bytes
Explanation: the fixed size of the udp packet header is 8 bytes. it contains four two- byte fields: source port address, destination port address, length of packet, and checksum.
222.

The port number is “ephemeral port number”, if the source host is                

A. ntp
B. echo
C. server
D. client
Answer» D. client
Explanation: port numbers from 1025 to 5000 are used as ephemeral port numbers in windows operating system. ephemeral port numbers are short-lived port numbers which can be used for clients in a udp system where there are temporary clients all the time.
223.

“Total length” field in UDP packet header is the length of                    

A. only udp header
B. only data
C. only checksum
D. udp header plus data
Answer» D. udp header plus data
Explanation: total length is the 16 bit field which contains the length of udp header and the data. the maximum value of the total length field and the maximum size of a udp datagram is 65,535 bytes (8 byte header + 65,527 bytes of data).
224.

Which is the correct expression for the length of UDP datagram?

A. udp length = ip length – ip header’s length
B. udp length = udp length – udp header’s length
C. udp length = ip length + ip header’s length
D. udp length = udp length + udp header’s length
Answer» A. udp length = ip length – ip header’s length
Explanation: a user datagram is encapsulated in an ip datagram. there is a field in the ip header that defines the total length of the ip packet. there is another field in the ip header that defines the length of the header. so if we subtract the length of the ip header that is encapsulated in the ip packet, we get the length of udp datagram.
225.

The              field is used to detect errors over the entire user datagram.

A. udp header
B. checksum
C. source port
D. destination port
Answer» B. checksum
Explanation: checksum field is used to detect errors over the entire user datagram. though it is not as efficient as crc which is used in tcp, it gets the job done for the udp
226.

Which of the following is false with respect to TCP?

A. connection-oriented
B. process-to-process
C. transport layer protocol
D. unreliable
Answer» D. unreliable
Explanation: tcp is a transport layer protocol that provides reliable and ordered delivery of a stream of bytes between hosts communicating via an ip network.
227.

In TCP, sending and receiving data is done as                

A. stream of bytes
B. sequence of characters
C. lines of data
D. packets
Answer» A. stream of bytes
Explanation: tcp provides stream oriented delivery between hosts communicating via an ip network and there are no message boundaries. tcp can concatenate data from a number of send () commands into one stream of data and still transmit it reliably.
228.

TCP groups a number of bytes together into a packet called                

A. packet
B. buffer
C. segment
D. stack
Answer» C. segment
Explanation: a segment may be collection of data from many send () statements. tcp transmits each segment as a stream of bytes.
229.

Communication offered by TCP is

A. full-duplex
B. half-duplex
C. semi-duplex
D. byte by byte
Answer» A. full-duplex
Explanation: data can flow both the directions at the same time during a tcp communication hence, it is full-duplex. this is the reason why tcp is used in systems that require full-duplex operation such as e-mail systems.
230.

Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment?

A. 10000
B. 10001
C. 12001
D. 11001
Answer» B. 10001
Explanation: the sequence number given to first byte of a segment, with respect to its order among the previous segments, is the sequence number of that segment.
231.

Bytes of data being transferred in each connection are numbered by TCP. These numbers start with a                    

A. fixed number
B. random sequence of 0’s and 1’s
C. one
D. sequence of zero’s and one’s
Answer» D. sequence of zero’s and one’s
Explanation: one might expect the sequence number of the first byte in the stream to be 0, or 1. but that does not happen in tcp, instead, the sender has to choose an initial sequence number (isn), which is basically a
232.

The value of acknowledgement field in a segment defines                

A. sequence number of the byte received previously
B. total number of bytes to receive
C. sequence number of the next byte to be received
D. sequence of zeros and ones
Answer» C. sequence number of the next byte to be received
Explanation: the acknowledgement field in a segment defines the sequence number of the byte which is to be received next i.e. sequence number of byte that the sender should transmit next.
233.

Two broad categories of congestion control are

A. open-loop and closed-loop
B. open-control and closed-control
C. active control and passive control
D. active loop and passive loop
Answer» A. open-loop and closed-loop
Explanation: open loop congestion control techniques are used to prevent congestion before it even happens by enforcing certain policies. closed loop congestion control techniques are used to treat congestion after it has happened.
234.

Retransmission of packets must not be done when                

A. packet is lost
B. packet is corrupted
C. packet is needed
D. packet is error-free
Answer» D. packet is error-free
Explanation: retransmission refers to the sender having to resend the packet to the receiver. it needs to be done only when some anomaly occurs with the packet like when the packet is lost or corrupted.
235.

In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. Whereas in Selective Repeat window, the sender resends                        

A. packet which are not lost
B. only those packets which are lost or corrupted
C. packet from starting
D. all the packets
Answer» B. only those packets which are lost or corrupted
Explanation: in selective repeat, the sender side uses a searching algorithm to find the packets which need to be retransmitted based on the negative acknowledgements received and then resends only those packets thus saving bandwidth.
236.

Closed-Loop control mechanisms try to

A. remove after congestion occurs
B. remove after sometime
C. prevent before congestion occurs
D. prevent before sending packets
Answer» A. remove after congestion occurs
Explanation: in closed loop congestion control, methods are implemented to remove congestion after it occurs. some of the methods used are backpressure and choke packet.
237.

The technique in which a congested node stops receiving data from the immediate upstream node or nodes is called as                

A. admission policy
B. backpressure
C. forward signaling
D. backward signaling
Answer» B. backpressure
Explanation: in this closed loop congestion control technique, the congested node propagates in the opposite direction of the data flow to inform the predecessor node to reduce the flow of packets. this is why this technique is called a node-to-node congestion control technique.
238.

The packet sent by a node to the source to inform it of congestion is called                

A. explicit
B. discard
C. choke
D. backpressure
Answer» C. choke
Explanation: choke packet is sent by a node to the source to inform it of congestion. two choke packet techniques can be used for the operation called hop-by-hop choke packet and source choke packet.
239.

In the slow-start algorithm, the size of the congestion window increases                       until it reaches a threshold.

A. exponentially
B. additively
C. multiplicatively
D. suddenly
Answer» A. exponentially
Explanation: in slow-start algorithm, the size of the congestion window increases exponentially until it reaches a threshold.
240.

Which is not a application layer protocol?

A. http
B. smtp
C. ftp
D. tcp
Answer» D. tcp
Explanation: tcp is transport layer protocol.
241.

The packet of information at the application layer is called                      

A. packet
B. message
C. segment
D. frame
Answer» B. message
Explanation: for application, presentation and session layers there is no data format for message. message is message as such in these three layers. but when it comes to transport, network, data and physical layer they have data in format of segments, packets, frames and bits respectively.
242.

Which one of the following is an architecture paradigms?

A. peer to peer
B. client-server
C. http
D. both peer-to-peer & client-server
Answer» D. both peer-to-peer & client-server
Explanation: http is a protocol.
243.

Application layer offers                service.

A. end to end
B. process to process
C. both end to end and process to process
D. none of the mentioned
Answer» A. end to end
Explanation: end to end service is provided in the application layer. whereas process to process service is provided at the transport layer.
244.

E-mail is                    

A. loss-tolerant application
B. bandwidth-sensitive application
C. elastic application
D. none of the mentioned
Answer» C. elastic application
Explanation: because it can work with available throughput.
245.

Pick the odd one out.

A. file transfer
B. file download
C. e-mail
D. interactive games
Answer» D. interactive games
Explanation: file transfer, file download and email are services provided by the application layer and there are message and data oriented.
246.

Which of the following is an application layer service?

A. network virtual terminal
B. file transfer, access, and management
C. mail service
D. all of the mentioned
Answer» D. all of the mentioned
Explanation: the services provided by the application layer are network virtual terminal, file transfer, access and management, mail services, directory services, various file and data operations.
247.

Which is a time-sensitive service?

A. file transfer
B. file download
C. e-mail
D. internet telephony
Answer» D. internet telephony
Explanation: internet telephony is loss- tolerant other applications are not.
248.

Transport services available to applications in one or another form

A. reliable data transfer
B. timing
C. security
D. all of the mentioned
Answer» D. all of the mentioned
Explanation: the transport services that are provided to application are reliable data transfer, security and timing. these are very important for proper end to end services.
249.

Electronic mail uses which Application layer protocol?

A. smtp
B. http
C. ftp
D. sip
Answer» A. smtp
Explanation: email uses various protocols like smtp, imap and pop. the most prominent one used in application layer is smtp.
250.

RMI stands for?

A. remote mail invocation
B. remote message invocation
C. remaining method invocation
D. remote method invocation
Answer» D. remote method invocation
Explanation: the rmi (remote method invocation) is an api that provides a mechanism to create distributed applications.

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.