

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Electrical Engineering , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Science in Information Technology FY (BSc IT) , Bachelor of Science in Information Technology SY (BSc IT) .
801. |
The functionalities of the presentation layerinclude |
A. | Data compression |
B. | Data encryption |
C. | Data description |
D. | All of the mentioned |
Answer» D. All of the mentioned |
802. |
Delimiting and synchronization of data exchange is providedby |
A. | Application layer |
B. | Session layer |
C. | Transport layer |
D. | Link layer |
Answer» B. Session layer |
803. |
In OSI model, when data is sent from device A to device B, the 5th layer to receive data at B is |
A. | Application layer |
B. | Transport layer |
C. | Link layer |
D. | Session layer |
Answer» D. Session layer |
804. |
In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is |
A. | Application layer |
B. | Transport layer |
C. | Link layer |
D. | Session layer |
Answer» A. Application layer |
805. |
Which layer is used to link the network support layers and user supportlayers? |
A. | Session layer |
B. | Data link layer |
C. | Transport layer |
D. | Network layer |
Answer» C. Transport layer |
806. |
OSI standsfor |
A. | Open system interconnection |
B. | Operating system interface |
C. | Optical service implementation |
D. | Open service Internet |
Answer» A. Open system interconnection |
807. |
Which Project 802 standard provides for a collision-free protocol? |
A. | 802.2 |
B. | 802.3 |
C. | 802.5 |
D. | 802.6 |
Answer» C. 802.5 |
808. |
The protocol data unit (PDU) for the application layer in the Internet stack is |
A. | Segment |
B. | Datagram |
C. | Message |
D. | Frame |
Answer» C. Message |
809. |
What is a Firewall in Computer Network? |
A. | The physical boundary of Network |
B. | An operating System of Computer Network |
C. | A system designed to prevent unauthorized access |
D. | A web browsing Software |
Answer» C. A system designed to prevent unauthorized access |
810. |
Which of the following services is not provided by wireless access point in 802.11 WLAN? |
A. | Association |
B. | Disassociation |
C. | Error correction |
D. | Integration |
Answer» C. Error correction |
811. |
Bridge works in which layer of the OSI model? |
A. | Application layer |
B. | Transport layer |
C. | Network layer |
D. | Data link layer |
Answer» D. Data link layer |
812. |
Why IP Protocol is considered as unreliable? |
A. | A packet may be lost |
B. | Packets may arrive out of order |
C. | Duplicate packets may be generated |
D. | All of the above |
Answer» D. All of the above |
813. |
What are the uses of subnetting ? |
A. | It divides one large network into several smaller ones |
B. | It divides network into network classes |
C. | It speeds up the speed of network |
D. | None of above |
Answer» A. It divides one large network into several smaller ones |
814. |
The Internet is an example of |
A. | Cell switched network |
B. | circuit switched network |
C. | Packet switched network |
D. | All of above |
Answer» C. Packet switched network |
815. |
What does protocol defines? |
A. | Protocol defines what data is communicated. |
B. | Protocol defines how data is communicated. |
C. | Protocol defines when data is communicated. |
D. | All of above |
Answer» D. All of above |
816. |
What is the use of Ping command? |
A. | To test a device on the network is reachable |
B. | To test a hard disk fault |
C. | To test a bug in an Application |
D. | To test a Pinter Quality |
Answer» A. To test a device on the network is reachable |
817. |
What is the Demilitarized Zone? |
A. | The area between firewall & connection to an external network |
B. | The area between ISP to Military area |
C. | The area surrounded by secured servers |
D. | The area surrounded by the Military |
Answer» A. The area between firewall & connection to an external network |
818. |
The combination of an IP address and a port number is known as. |
A. | network number |
B. | socket address |
C. | subnet mask number |
D. | MAC address |
Answer» B. socket address |
819. |
Which of the following is reliable communication? |
A. | TCP |
B. | IP |
C. | UPD |
D. | All of them |
Answer» A. TCP |
820. |
What is the size of Host bits in Class B of IP address? |
A. | 04 |
B. | 08 |
C. | 16 |
D. | 32 |
Answer» C. 16 |
821. |
Which of the following is not associated with the session layer? |
A. | Dialog control |
B. | Token management |
C. | Semantics of the information transmitted |
D. | Synchronization |
Answer» C. Semantics of the information transmitted |
822. |
The Internet Control Message Protocol (ICMP) |
A. | allows gateways to send error a control messages to other gateways or hosts |
B. | provides communication between the Internet Protocol Software on one machine and the Internet Protocol Software on another |
C. | reports error conditions to the original source, the source must relate errorsto individual application programs and take action to correct the problem |
D. | All of the above |
Answer» A. allows gateways to send error a control messages to other gateways or hosts |
823. |
Your company has a LAN in its downtown office and has now set up aLAN in the manufacturing plant in the suburbs. To enable everyone to share data and resources between the two LANs, what type of device(s) are needed to connect them? Choose the most correct answer. |
A. | Modem |
B. | Cable |
C. | Hub |
D. | Router |
Answer» D. Router |
824. |
Which of the following TCP/IP protocol is used for transferringelectronic mail messages from one machine to another? |
A. | FTP |
B. | SNMP |
C. | SMTP |
D. | RPC |
Answer» C. SMTP |
825. |
Which of the following device is used to connect two systems, especiallyif the systems use different protocols? |
A. | hub |
B. | bridge |
C. | gateway |
D. | repeater |
Answer» C. gateway |
826. |
can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. |
A. | Hamming Code |
B. | CRC |
C. | VRC |
D. | None of the above |
Answer» B. CRC |
827. |
The PSTN is an example of a............................. network. |
A. | packet switched |
B. | circuit switched |
C. | message switched |
D. | None of these |
Answer» B. circuit switched |
828. |
When and where RARP is used intentionally or effectively? |
A. | At the time of network booting where no space to store IP address (or diskless network) for address resolution. |
B. | In broadcasting to get IP address of Network. |
C. | To get the access in private network whenever it is required. |
D. | None of the above. |
Answer» A. At the time of network booting where no space to store IP address (or diskless network) for address resolution. |
829. |
Which one of the following routing algorithm can be used for network layer design? |
A. | shortest path algorithm |
B. | distance vector routing |
C. | link state routing |
D. | all of the mentioned |
Answer» D. all of the mentioned |
830. |
A subset of a network that includes all the routers but contains no loopsis called: |
A. | spanning tree |
B. | spider structure |
C. | spider tree |
D. | none of the mentioned |
Answer» A. spanning tree |
831. |
ICMP is primarily used for: |
A. | error and diagnostic functions |
B. | addressing |
C. | forwarding |
D. | none of the mentioned |
Answer» A. error and diagnostic functions |
832. |
User datagram protocol is called connectionless because: |
A. | all UDP packets are treated independently by transport layer |
B. | it sends data as a stream of related packets |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» A. all UDP packets are treated independently by transport layer |
833. |
An endpoint of an inter-process communication flow across a computer network is called: |
A. | socket |
B. | pipe |
C. | port |
D. | none of the mentioned |
Answer» A. socket |
834. |
A is a TCP name for a transport service access point. |
A. | port |
B. | pipe |
C. | node |
D. | none of the mentioned |
Answer» A. port |
835. |
Which one of the following is a transport layer protocol? |
A. | stream control transmission protocol |
B. | internet control message protocol |
C. | neighbour discovery protocol |
D. | dynamic host configuration protocol |
Answer» A. stream control transmission protocol |
836. |
Physical layer provides: |
A. | mechanical specifications of electrical connectors and cables |
B. | electrical specification of transmission line signal level |
C. | specification for IR over optical fiber |
D. | all of the mentioned |
Answer» D. all of the mentioned |
837. |
The translates internet domain and host names to IP address. |
A. | domain name system |
B. | routing information protocol |
C. | network time protocol |
D. | internet relay chat |
Answer» A. domain name system |
838. |
When displaying a web page, the application layer uses the: |
A. | HTTP protocol |
B. | FTP protocol |
C. | SMTP protocol |
D. | none of the mentioned |
Answer» A. HTTP protocol |
839. |
This is a time-sensitive service: |
A. | File transfer |
B. | File download |
C. | |
D. | Internet telephony |
Answer» D. Internet telephony |
840. |
Packet sniffers involve: |
A. | Active receiver |
B. | Passive receiver |
C. | Both of the mentioned |
D. | None of the mentioned |
Answer» B. Passive receiver |
841. |
Identify the incorrect statement: |
A. | FTP stands for File Transfer Protocol |
B. | FTP uses two parallel TCP connections |
C. | FTP sends its control information in-band |
D. | FTP sends exactly one file over the data connection |
Answer» C. FTP sends its control information in-band |
842. |
If 5 files are transferred from server A to client B in the same session. The number of TCP connection between A and B is: |
A. | 5 |
B. | 10 |
C. | 2 |
D. | 6 |
Answer» D. 6 |
843. |
Find the FTP reply whose message is wrongly matched: |
A. | 331 – Username OK, password required |
B. | 425 – Can’t open data connection |
C. | 452 – Error writing file |
D. | 452 – Can’t open data connection |
Answer» D. 452 – Can’t open data connection |
844. |
In an Ethernet local area network, which one of the following statementsis TRUE? |
A. | A station stops to sense the channel once it starts transmitting a frame. |
B. | The purpose of the jamming signal is to pad the frames that are smallerthan the minimum frame size. |
C. | A station continues to transmit the packet even after the collision is detected. |
D. | The exponential back off mechanism reduces the probability of collision on retransmissions |
Answer» D. The exponential back off mechanism reduces the probability of collision on retransmissions |
845. |
The first Network: |
A. | CNNET |
B. | NSFNET |
C. | ASAPNET |
D. | ARPANET |
Answer» D. ARPANET |
846. |
Which organization has authority over interstate and international commerce in the communications field? |
A. | ITU-T |
B. | IEEE |
C. | FCC |
D. | ISOC |
Answer» C. FCC |
847. |
Baud rate is: |
A. | number of signal changes per second |
B. | number of bits per second |
C. | number of bytes per second |
D. | number of ASCII characters per second |
Answer» A. number of signal changes per second |
848. |
The slowest transmission speeds are those of |
A. | Coaxial cable |
B. | Twisted pair wire |
C. | Fiber-optic cable |
D. | Microwave |
Answer» B. Twisted pair wire |
849. |
The performance of a data communication network depends on |
A. | The number of users |
B. | The transmission media |
C. | The hardware and software |
D. | All of the above |
Answer» D. All of the above |
850. |
Which of the following to keep track of the individual units of data (called packets) that a message is divided into for efficient routing through the Internet. |
A. | Address Resolution Protocol (ARP) |
B. | Internet Protocol (IP) |
C. | Hypertext transfer Protocol (HTTP) |
D. | Transmission Control Protocol/Internet Protocol (TCP/IP) |
Answer» D. Transmission Control Protocol/Internet Protocol (TCP/IP) |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.