162
79.5k

310+ Computer Architecture and Organization Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) .

251.

A remote object is an object whose method can be invoked from another virtual environment.

A. true
B. false
C. topic 5.2 client server programming
Answer» A. true
Explanation: the statement is true. jvm is java virtual environment. rmi uses stub and skeleton object for communication with the remote object. a remote object is an object whose method can be invoked from another virtual environment.
252.

A typical                    program creates some remote objects, makes references to these objects accessible, and waits for clients to invoke methods on these objects.

A. server
B. client
C. thread
D. concurrent
Answer» A. server
Explanation: a server program creates remote objects. it gives reference to these objects and then waits for clients to invoke methods on these objects.
253.

A typical                      program obtains a remote reference to one or more remote objects on a server and then invokes methods on them.

A. server
B. client
C. thread
D. concurrent
Answer» B. client
Explanation: a client program obtains a remote reference to one or more remote objects on a server. it then invokes methods on them.
254.

The                        layer, which provides the interface that client and server application objects use to interact with each other.

A. increasing
B. count
C. bit
D. stub/skeleton
Answer» D. stub/skeleton
Explanation: the stub or skeleton layer
255.

A layer which is the binary data protocol layer.

A. stub layer
B. skeleton layer
C. remote layer
D. transport protocol
Answer» D. transport protocol
Explanation: the transport protocol layer is the binary data protocol that sends remote object requests over the wire. a client is any remote application that communicates with these server objects.
256.

A middleware layer between the stub skeleton and transport.

A. remote layer
B. instruction layer
C. reference layer
D. remote reference layer
Answer» D. remote reference layer
Explanation: the remote reference layer is the middleware between the stub/skeleton layer and underlying transport protocol.
257.

An object acting as a gateway for the client side.

A. skeleton
B. stub
C. remote
D. server
Answer» B. stub
Explanation: the stub is an object that acts as a gateway for the client side. the outgoing requests are passed through the stub.
258.

A gateway for the server side object.

A. skeleton
B. stub
C. remote
D. server
Answer» A. skeleton
Explanation: the skeleton is an object, acts as a gateway for the server side object. all the incoming requests are routed through it.
259.

RMI uses stub and skeleton for communication with the                  object.

A. client
B. remote
C. server
D. any
Answer» B. remote
Explanation: rmi uses stub and skeleton object for communication with the remote object. a remote object is an object whose method can be invoked from another jvm.
260.

A piece of icon or image on a web page associated with another webpage is called

A. url
B. hyperlink
C. plugin
D. extension
Answer» B. hyperlink
Explanation: urls are locators for resources present on the world wide web. a plugin provides extra functionality to the webpage. an extension provides modification allowance for the core functionality of a webpage. hyperlink is piece of icon or image on a web page associated with another webpage.
261.

Dynamic web page              

A. is same every time whenever it displays
B. generates on demand by a program or a request from browser
C. both is same every time whenever it displays and generates on demand by a program or a request from browser
D. is different always in a predefined order
Answer» B. generates on demand by a program or a request from browser
Explanation: a dynamic web page provides different content every time the user opens it based on some events like new additions or time of the day. languages such as javascript are used to respond to client-side events while languages such as php as used to respond to server-side events.
262.

What is a web browser?

A. a program that can display a web page
B. a program used to view html documents
C. it enables user to access the resources of internet
D. all of the mentioned
Answer» D. all of the mentioned
Explanation: a web browser is an application program that is used to access the world wide web resources, applications and websites. some examples of web browsers are google chrome, internet explorer and safari.
263.

Common gateway interface is used to

A. generate executable files from web content by web server
B. generate web pages
C. stream videos
D. download media files
Answer» A. generate executable files from web content by web server
Explanation: cgi is an interface through servers can run execute console-based executable files on a web server that generates dynamic web pages. a cgi script executes only when a request is made. the script then generates html.
264.

URL stands for                  

A. unique reference label
B. uniform reference label
C. uniform resource locator
D. unique resource locator
Answer» C. uniform resource locator
Explanation: the uniform resource locator
265.

A web cookie is a small piece of data that is                

A. sent from a website and stored in user’s web browser while a user is browsing a website
B. sent from user and stored in the server while a user is browsing a website
C. sent from root server to all servers
D. sent from the root server to other root servers
Answer» A. sent from a website and stored in user’s web browser while a user is browsing a website
Explanation: a web cookie is a small piece of data sent from a website and stored in user’s web browser while a user is browsing the website and is used to remember stateful information about the user’s operations on the website. this can help the website provide a better browsing experience to the user.
266.

Which one of the following is not used to generate dynamic web pages?

A. php
B. asp.net
C. jsp
D. css
Answer» D. css
Explanation: css alone cannot be used to generate dynamic web pages as it does not provide many event handling functions. it can
267.

What is document object model (DOM)?

A. convention for representing and interacting with objects in html documents
B. application programming interface
C. hierarchy of objects in asp.net
D. scripting language
Answer» A. convention for representing and interacting with objects in html documents
Explanation: dom is a hierarchical model
268.

AJAX stands for                

A. asynchronous javascript and xml
B. advanced jsp and xml
C. asynchronous jsp and xml
D. advanced javascript and xml
Answer» A. asynchronous javascript and xml
Explanation: ajax is a group of technologies that works on the client-side to create asynchronous web applications. it is used to modify only a part of a webpage and not the whole webpage whenever some event occurs.
269.

An alternative to JavaScript on windows platform is                

A. vbscript
B. asp.net
C. jsp
D. php
Answer» A. vbscript
Explanation: vbscript is a general-purpose,
270.

A DNS client is called                    

A. dns updater
B. dns resolver
C. dns handler
D. none of the mentioned
Answer» B. dns resolver
Explanation: dns client also known as dns resolver also known as dns lookup helps to resolve dns requests using an external dns server.
271.

Servers handle requests for other domains

A. directly
B. by contacting remote dns server
C. it is not possible
D. none of the mentioned
Answer» B. by contacting remote dns server
Explanation: whenever a request is received at server from other domains, it handles this situation by contacting remote dns server.
272.

DNS database contains                

A. name server records
B. hostname-to-address records
C. hostname aliases
D. all of the mentioned
Answer» D. all of the mentioned
Explanation: domain name system not only deals with mapping ip addresses with the hostname but also deals with exchange of information in the server.
273.

If a server has no clue about where to find the address for a hostname then                

A. server asks to the root server
B. server asks to its adjcent server
C. request is not processed
D. none of the mentioned
Answer» A. server asks to the root server
Explanation: root name servers are actually very important and critical as they are the first step in translating human readable hostnames
274.

Which one of the following allows client to update their DNS entry as their IP address change?

A. dynamic dns
B. mail transfer agent
C. authoritative name server
D. none of the mentioned
Answer» A. dynamic dns
Explanation: dynamic dns or in short ddns or dyndns helps in automatically updating a name server in the dns. this does not require manual editing.
275.

Wildcard domain names start with label

A. @
B. *
C. &
D. #
Answer» B. *
Explanation: a wildcard dns record matches requests to a non existent domain name. this wildcard dns record is specified by using asterisk “*” as the starting of a domain name.
276.

The right to use a domain name is delegated by domain name registers which are accredited by                

A. internet architecture board
B. internet society
C. internet research task force
D. internet corporation for assigned names and numbers
Answer» D. internet corporation for assigned names and numbers
Explanation: the icann (internet corporation for assigned names and numbers) deals with ip address space allocation, protocol identifier assignment, generic and country code top level domain name system management (gtld and cctld).
277.

The domain name system is maintained by

A. distributed database system
B. a single server
C. a single computer
D. none of the mentioned
Answer» A. distributed database system
Explanation: a domain name system is maintained by a distributed database system. it is a collection of multiple, logically interrelated databases distributed over a computer network.
278.

Which one of the following is not true?

A. multiple hostnames may correspond to a single ip address
B. a single hostname may correspond to many ip addresses
C. a single hostname may correspond to a single ip address
D. none of the mentioned
Answer» C. a single hostname may correspond to a single ip address
Explanation: it need not be that a single hostname will correspond to a ip address. for example facebook.com and fb.com both correspond to same ip address. so there can be multiple hostnames for a single ip address.
279.

Simple mail transfer protocol (SMTP) utilizes                    as the transport layer protocol for electronic mail transfer.

A. tcp
B. udp
C. dccp
D. sctp
Answer» A. tcp
Explanation: since tcp is a reliable protocol, it’s more efficient to use tcp protocol for e-mail transfer. tcp also provides more security than other transport layer protocols.
280.

SMTP connections secured by SSL are known as                            

A. smtps
B. ssmtp
C. snmp
D. starttls
Answer» A. smtps
Explanation: ssmtp is a simple mail transfer program to send mail from a local pc to a mail host. snmp is a network management protocol. starttls connections are secured by tls.
281.

SMTP uses which of the following TCP port?

A. 22
B. 23
C. 21
D. 25
Answer» D. 25
Explanation: port 21 is used for ftp control connection, port 22 is used by ssh, and port 23 is used by telnet.
282.

Which one of the following protocol is used to receive mail messages?

A. smtp
B. post office protocol (pop)
C. internet message access protocol (imap)
D. ftp
Answer» D. ftp
Explanation: ftp is used to share files. smtp, pop and imap are the protocols used to send and receive mails on the internet.
283.

What is on-demand mail relay (ODMR)?

A. protocol for smtp security
B. an smtp extension
C. protocol for web pages
D. protocol for faster mail transfer
Answer» B. an smtp extension
Explanation: odmr is an extension to smtp, in which mails are relayed to the receivers after they are authenticated. it
284.

An SMTP session may not include

A. zero smtp transaction
B. one smtp transaction
C. more than one smtp transaction
D. one http transaction
Answer» D. one http transaction
Explanation: an smtp session can only include smtp transactions regardless the number. any other protocol’s transaction is not included in an smtp session.
285.

SMTP defines                

A. message transport
B. message encryption
C. message content
D. message password
Answer» A. message transport
Explanation: as the name suggests, simple mail transfer protocol is only responsible for “how” the message is transferred i.e.
286.

Which layer is responsible for process-to- process delivery?

A. physical layer
B. network layer
C. transport layer
D. application layer
Answer» C. transport layer
Explanation: the transport layer is responsible for process-to-process delivery, error control and flow control. it provides an interface for the implementation of process to process delivery through ports. there are 65,535 port numbers.
287.

6 INTRODUCTION TO PEER TO PEER NETWORKS

A. client/server
B. source/destination
C. message transfer
D. peer to peer
Answer» A. client/server
Explanation: the most common method used for this communication is client/server. the client requests a service through a particular port number to the port of the server using its socket address. then the server responds by giving the requested service to the client port.
288.

Multiple processes on destinations at transport layer are identified by                      

A. mac address
B. port number
C. host number
D. host address
Answer» B. port number
Explanation: multiple processes on destinations are identified by a transport layer address also called as port number. the ip address along with the port number is called the socket address.
289.

According to Internet Assigned Numbers Authority (IANA), which of the following ranges is not a part of port number ranges?

A. well-known ports
B. registered ports
C. dynamic ports
D. static ports
Answer» D. static ports
Explanation: iana divided port numbers into three ranges i.e., well-known, registered and dynamic ports. well-known port numbers range from 0 to 1023, registered port numbers are from 1024 to 49151 and dynamic port numbers are from 49152 to 65535.
290.

The combination of an IP address and port number is called as                  

A. socket address
B. port address
C. mac address
D. host address
Answer» A. socket address
Explanation: socket address is the combination of an ip address and a port number and it is used to define the client-end and server-end processes uniquely.
291.

Which of the following is false with respect to Connectionless service of transport layer protocol?

A. packets are not numbered
B. packets are not delayed
C. no acknowledgement
D. packet may arrive out of sequence
Answer» B. packets are not delayed
Explanation: there is a high probability in connectionless services like udp that the packet gets delayed or lost because there is no connection made between the two end nodes. no connection means that there is no unique pathway for the packets to travel.
292.

In transport layer, Multiplexing is done at

A. channel
B. receiver site
C. sender site
D. packet
Answer» C. sender site
Explanation: at the sender’s side, there are multiple processes which may want to send packets. but there is only one transport layer protocol like tcp or udp working at a time. so the transport layer protocol gets the messages from these processes and separates them with different port numbers. this process is called multiplexing and it is done before sending packets to the receivers side.
293.

The process of error checking and dropping of the header, delivering messages to appropriate process based on port number is called as                

A. delivery of packets
B. error correction
C. multiplexing
D. demultiplexing
Answer» D. demultiplexing
Explanation: demultiplexing is the process of error checking and dropping of the header, delivering messages to appropriate process based on port number. the transport layer does this on the receiver’s end after the packet is received and takes help of the header attached by the sender’s side transport layer during multiplexing.
294.

Number of phases in the handshaking protocol?

A. 2
B. 3
C. 4
D. 5
Answer» C. 4
Explanation: there are 4 phases in the handshaking protocol. these are –
295.

In the SSL record protocol operation pad_2 is –

A. is the byte 0x36 repeated 40 times for md5
B. is the byte 0x5c repeated 48 times for md5
C. is the byte 0x5c repeated 48 times for sha-1
D. is the byte 0x36 repeated 48 times for md5
Answer» B. is the byte 0x5c repeated 48 times for md5
Explanation: pad_2 = is the byte 0x5c repeated 48 times for md5.
296.

In the SSL record protocol operation pad_1 is –

A. is the byte 0x36 repeated 40 times for md5
B. is the byte 0x5c repeated 40 times for md5
C. is the byte 0x5c repeated 48 times for sha-1
D. is the byte 0x36 repeated 48 times for md5
Answer» D. is the byte 0x36 repeated 48 times for md5
Explanation: pad_1 = is the byte 0x36 repeated 48 times for md5.
297.

In the Handshake protocol action, which is the last step of the Phase 2 : Server Authentication and Key Exchange?

A. server_done
B. server_key_exchange
C. certificate_request
D. crtificate_verify
Answer» A. server_done
Explanation: the last step of the phase 2 is the server_done step.
298.

Which is the key exchange algorithm used in CipherSuite parameter?

A. rsa
B. fixed diffie-hellman
C. ephemeral diffie-hellman
D. any of the mentioned
Answer» D. any of the mentioned
Explanation: we can use either of the following for the ciphersuite key exchange-
299.

The certificate message is required for any agreed-on key exchange method except

A. ephemeral diffie-hellman
B. anonymous diffie-hellman
C. fixed diffie-hellman
D. rsa
Answer» B. anonymous diffie-hellman
Explanation: the certificate message is required for any agreed-on key exchange method except anonymous diffie-hellman.
300.

In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?

A. fortezza
B. anonymous diffie-hellman
C. fixed diffie-hellman
D. rsa
Answer» C. fixed diffie-hellman
Explanation: the fixed diffie-helmann does not require the server_key_exchange step in the handshake protocol.

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.