

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Electrical Engineering , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Science in Information Technology FY (BSc IT) , Bachelor of Science in Information Technology SY (BSc IT) .
951. |
Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing plant in the suburbs. To enable everyone to share data and resources between the two LANs, what type of device(s) are needed to connect them? Choose the most correct answer. |
A. | Modem |
B. | Cable |
C. | Hub |
D. | Router |
Answer» D. Router |
952. |
Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? |
A. | FTP |
B. | SNMP |
C. | SMTP |
D. | RPC |
Answer» C. SMTP |
953. |
Which of the following device is used to connect two systems, especially if the systems use different protocols? |
A. | hub |
B. | bridge |
C. | gateway |
D. | repeater |
Answer» C. gateway |
954. |
_______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. |
A. | Hamming Code |
B. | CRC |
C. | VRC |
D. | None of the above |
Answer» B. CRC |
955. |
The PSTN is an example of a ………………… network. |
A. | packet switched |
B. | circuit switched |
C. | message switched |
D. | None of these |
Answer» B. circuit switched |
956. |
A subset of a network that includes all the routers but contains no loops is called: |
A. | spanning tree |
B. | spider structure |
C. | spider tree |
D. | none of the mentioned |
Answer» A. spanning tree |
957. |
An endpoint of an inter-process communication flow across a computer network is called: |
A. | socket |
B. | pipe |
C. | port |
D. | none of the mentioned |
Answer» A. socket |
958. |
In an Ethernet local area network, which one of the following statements is TRUE? |
A. | A station stops to sense the channel once it starts transmitting a frame. |
B. | The purpose of the jamming signal is to pad the frames that are smaller than the minimum frame size. |
C. | A station continues to transmit the packet even after the collision is detected. |
D. | The exponential back off mechanism reduces the probability of collision on retransmissions |
Answer» D. The exponential back off mechanism reduces the probability of collision on retransmissions |
959. |
A small network making up the Internet and also having a small numbers of computers within it is called |
A. | Host |
B. | Address |
C. | Subdomain |
D. | None of the above |
Answer» C. Subdomain |
960. |
If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is __________. |
A. | 1 kbps |
B. | 1.25 kbps |
C. | 2 kbps |
D. | 10 kbps |
Answer» D. 10 kbps |
961. |
In CRC there is no error if the remainder at the receiver is _____. |
A. | equal to the remainder at the sender |
B. | zero |
C. | nonzero |
D. | the quotient at the sender |
Answer» B. zero |
962. |
A modulator converts a _____ signal to a(n) _____ signal. |
A. | FSK; PSK |
B. | PSK; FSK |
C. | analog; digital |
D. | digital; analog |
Answer» C. analog; digital |
963. |
ASK, PSK, FSK, and QAM are examples of _____ encoding. |
A. | digital-to-digital |
B. | digital-to-analog |
C. | analog-to-analog |
D. | analog-to-digital |
Answer» B. digital-to-analog |
964. |
With an IP address of 201.142.23.12, what is your default subnet mask? |
A. | 0.0.0.0 |
B. | 255.0.0.0 |
C. | 255.255.0.0 |
D. | 255.255.255.0 |
Answer» D. 255.255.255.0 |
965. |
DSL stands for ------------------------ |
A. | data subscriber lines |
B. | dual subscriber lines |
C. | delay subscriber lines |
D. | digital subscriber lines |
Answer» D. digital subscriber lines |
966. |
The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard? |
A. | CSMA/CD |
B. | Token passing |
C. | Collision detection |
D. | Time sharing |
Answer» B. Token passing |
967. |
One of the header fields in an IP datagram is the Time to Live (TTL) field. Which of the following statements best explains the need for this field? |
A. | It can be used to prioritize packets |
B. | It can be used to reduce delays |
C. | It can be used to optimize throughput |
D. | It can be used to prevent packet looping |
Answer» D. It can be used to prevent packet looping |
968. |
Which of the following system calls results in the sending of SYN packets? |
A. | socket |
B. | bind |
C. | listen |
D. | connect |
Answer» D. connect |
969. |
What is the maximum size of data that the application layer can pass on to the TCP layer below? |
A. | Any size |
B. | 2^16 bytes-size of TCP header |
C. | 2^16 bytes |
D. | 1500 bytes |
Answer» A. Any size |
970. |
Station A needs to send a message consisting of 9 packets to Station B using a sliding window (window size 3) and go-back-n error control strategy. All packets are ready and immediately available for transmission. If every 5th packet that A transmits gets lost (but no acks from B ever get lost), then what is the number of packets that A will transmit for sending the message to B? |
A. | 12 |
B. | 14 |
C. | 16 |
D. | 18 |
Answer» C. 16 |
971. |
Which one of the following statements is FALSE? |
A. | Packet switching leads to better utilization of bandwidth resources than circuit switching. |
B. | Packet switching results in less variation in delay than circuit switching. |
C. | Packet switching requires more per packet processing than circuit switching |
D. | Packet switching can lead to reordering unlike in circuit switching |
Answer» B. Packet switching results in less variation in delay than circuit switching. |
972. |
In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ________. |
A. | 2 bytes |
B. | 1 bytes |
C. | 4 bytes |
D. | 5 bytes |
Answer» D. 5 bytes |
973. |
In Ethernet CSMA/CD, the special bit sequence transmitted by media access management to handle collision is called |
A. | Preamble |
B. | Post amble |
C. | Jam |
D. | None of the above |
Answer» C. Jam |
974. |
How many digits of the DNIC (Data Network Identification Code) identify the country? |
A. | First three |
B. | First four |
C. | First five |
D. | First six |
Answer» A. First three |
975. |
Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? |
A. | FTP |
B. | SNMP |
C. | SMTP |
D. | RPC |
Answer» C. SMTP |
976. |
Which of the following device is used to connect two systems, especially if the systems use different protocols? |
A. | hub |
B. | bridge |
C. | gateway |
D. | repeater |
Answer» C. gateway |
977. |
_______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. |
A. | Hamming Code |
B. | CRC |
C. | VRC |
D. | None of the above |
Answer» B. CRC |
978. |
If 5 files are transferred from server A to client B in the same session. The number of TCP connection between A and B is: |
A. | 5 |
B. | 10 |
C. | 2 |
D. | 6 |
Answer» D. 6 |
979. |
In an Ethernet local area network, which one of the following statements is TRUE? |
A. | A station stops to sense the channel once it starts transmitting a frame. |
B. | The purpose of the jamming signal is to pad the frames that are smaller than the minimum frame size. |
C. | A station continues to transmit the packet even after the collision is detected. |
D. | The exponential back off mechanism reduces the probability of collision on retr |
Answer» A. A station stops to sense the channel once it starts transmitting a frame. |
980. |
Which of the following to keep track of the individual units of data (called packets) that a message is divided into for efficient routing through the Internet. |
A. | Address Resolution Protocol (ARP) |
B. | Internet Protocol (IP) |
C. | Hypertext transfer Protocol (HTTP) |
D. | Tr |
Answer» C. Hypertext transfer Protocol (HTTP) |
981. |
If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is __________. |
A. | 1 kbps |
B. | 1.25 kbps |
C. | 2 kbps |
D. | 10 kbps |
Answer» D. 10 kbps |
982. |
Sending a file from your personal computer's primary memory or disk to another computer is called |
A. | uploading |
B. | downloading |
C. | logging on |
D. | hangs on |
Answer» A. uploading |
983. |
Consider different activities related to email.
|
A. | m1:HTTP, m2:SMTP, m3:POP |
B. | m1:SMTP, m2:FTP, m3:HTTP |
C. | m1:SMTP, m2:POP, m3:HTTP |
D. | m1:POP, m2:SMTP, m3:IMAP |
Answer» C. m1:SMTP, m2:POP, m3:HTTP |
984. |
In the slow start phase of the TCP congestion control algorithm, the size of the congestion window |
A. | does not increase |
B. | increases linearly |
C. | increases quadratically |
D. | increases exponentially |
Answer» D. increases exponentially |
985. |
Match the following:
|
A. | P – 2 Q – 1 R – 3 S – 5 |
B. | P – 1 Q – 4 R – 2 S – 3 |
C. | P – 1 Q – 4 R – 2 S – 5 |
D. | P – 2 Q – 4 R – 1 S – 3 |
Answer» B. P – 1 Q – 4 R – 2 S – 3 |
986. |
In serial data transmission, every byte of data is padded with a ‘0’ in the beginning and one or two ‘1’ s at the end of byte because |
A. | Receiver is to be synchronized for byte reception |
B. | Receiver recovers lost ‘0’ and ‘1’s from these padded bits |
C. | Padded bits are useful in parity computation |
D. | None of these |
Answer» A. Receiver is to be synchronized for byte reception |
987. |
What will be the efficiency of a Stop and Wait protocol, if the transmission time for a frame is 20ns and the propagation time is 30ns? |
A. | 20% |
B. | 25% |
C. | 40% |
D. | 66% |
Answer» B. 25% |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.