Computer Science MCQ Practice Test
December 21, 2016 | Author: harsh.mehta1745 | Category: N/A
Short Description
computer science MCQ best for exam preparation...
Description
Computer Science MCQ Practice Test
Computer Science MCQ Pratice Test
_____________________________________________________________________________________________________________________________
Home
CS MCQ
Practice Test
CS GATE Papers
CS UGC NET Papers
About Us
Contact
Mobile IP provides two basic functions Route discovery and registration Agent discovery and registration IP binding and registration None of the above _____________________________________________________________________________________ Error detection at a data link level is achieved by Bit stuffing Cyclic redundancy codes Hamming codes Equalization _____________________________________________________________________________________ Which network topology is considered passive? Cross Star Bus Tree _____________________________________________________________________________________ ______ is a satellite based tracking system that enables the determination of person’s position. Bluetooth WAP Short Message Service Global Positioning System _____________________________________________________________________________________ FTP does not use Two transfer mode Control connect ion to remote computer before file can be transfer red User Datagram Protocol Authorizat ion of a user through login and password verification _____________________________________________________________________________________ The Internet Control Message Protocol (ICMP) Allows gateways to send error a control messages to other gateways or hosts Provides communication between the Internet Protocol Software on one machine and the Internet Protocol Software on another Reports error conditions to the original source, the source must relate errors to individual application programs and take action to correct the problem All of the above _____________________________________________________________________________________ Which of the following statements is correct for the use of packet switching? The subdivision of information into individually addressed packets in conjunction with alternative routing arrangement enabled the transmission path to be altered in the event of congestion or individual link failure The employment of additional intelligence within the network enabled more sophisticated error control and link control procedures to be applied By employing wide bandwidth circuits for the trunk networks substantial economies through extensive sharing of capacity could be achieved. All of the above _____________________________________________________________________________________ The cost of the network is usually determined by time complexity switching complexity circuit complexity none of these _____________________________________________________________________________________ To employ multi-access in GSM, users are given different: time slots bandpass filters andsets frequency bands _____________________________________________________________________________________ Which of the following technique is used for encapsulation? A technique used in best-effort delivery systems to avoid endlessly looping packets. A technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame. One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size All of the above _____________________________________________________________________________________ FDDI is a Ring network Star network Mesh network Bus based network _____________________________________________________________________________________ Another name of IEEE 802.11 a is ____________ Wi-Max Fast Ethernet Wi-Fi 802.11 g _____________________________________________________________________________________ End-to-End connectivity is provided from Last-to-Last in Network layer Session layer Transport layer Data link layer _____________________________________________________________________________________ A station in a network forwards incoming packets by placing them on its shortest output queue. What routing algorithm is being used? Hot potato routing Delta routing Flooding Static routing _____________________________________________________________________________________ For the transmission of the signal, Bluetooth wireless technology uses time division multiplexing frequency division multiplexing time division duplex frequency division duplex _____________________________________________________________________________________ What frequency range is used for FM radio transmission? Very Low Frequency : 3 kHz to 30. kHz Low Frequency : 30 kHz to 300 kHz High Frequency : 3 MHz to 30 MHz Very High Frequency : 30 MHz to 300 MHz _____________________________________________________________________________________ In which circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM ? Space division Time division Virtual Packet _____________________________________________________________________________________ When compared with analog cellular systems, an advantage of digital TDMA cellular system is that it is less complicated it requires less of computer memory it conserves spectrum bandwidth it costs less _____________________________________________________________________________________ Radio signals generally propagate according to the following mechanisms Modulation, Amplification, Scattering Reflection, Diffraction, Scattering
http://www.computersciencemcq.com/pratice_test_deatil.aspx[5/15/2013 2:51:08 PM]
Computer Science MCQ Practice Test Amplification, Diffraction, Modulation Reflection, Amplification, Diffraction _____________________________________________________________________________________ In order that a code is ‘t’ error correcting, the minimum Hamming distance should be t 2t-1 2t 2t+1 _____________________________________________________________________________________ What can greatly reduce TCP/IP configuration problems? WINS Proxy WINS Server PDC DHCP Server _____________________________________________________________________________________ A telephone conference call is an example of which type of communications Same time / same place Same time / different place Different time / different place Different time / same place _____________________________________________________________________________________ Assume that source S and destination D are connected through two intermediate routers labeled R. Determine how many times each packet has to visit the network layer and the data link layer during a transmission from S to D.
Network layer – 4 times and Data link layer-4 times Network layer – 4 times and Data link layer-3 times Network layer – 4 times and Data link layer-6 times Network layer – 2 times and Data link layer-6 times _____________________________________________________________________________________ If the period of a signal is 1000 ms, then what is its frequency in kilohertz ? 10 –3 KHz 10 –2 KHz 10 –1 KHz 1 KHz _____________________________________________________________________________________ Usually information security in a network is achieved by
Layering Cryptography Grade of service None of the above _____________________________________________________________________________________ How many hosts are attached to each of the local area networks at your site? 128 256 254 512 _____________________________________________________________________________________ Devices interconnected by the LAN should include Computers and terminals Mass storage device, printers and plotters Bridges and gateways All of the above _____________________________________________________________________________________ HMP (Host Monitoring Protocol) is: A TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address A TCP/IP high level protocol for transferring files from one machine to another. A protocol used to monitor computers A protocol that handles error and control messages _____________________________________________________________________________________ Handoff is the mechanism that Transfer an ongoing call from one base station to another Initiating a new call Dropping an ongoing call None of above _____________________________________________________________________________________ Device on one network can communicate with devices on another network via a Hub/Switch Utility server File server Gateway _____________________________________________________________________________________ What is the name of the software package that allows people to send electronic mail along a network of computers and workstations? Memory resident package Project management package Data communication package Electronic mail package _____________________________________________________________________________________ Which technology is sometime referred to as wireless cable ? MMDS ATM LMDS CDMA _____________________________________________________________________________________ ATM is an example of Ring topology Star topology Bus topology None of the above _____________________________________________________________________________________ Match the following with link quality measurement and handoff initiation : (a) Networked-Controlled Handoff(NCHO) (i) MS connect to BS (b) Mobile-Assisted Handoff(MAHO) (ii) Process via channel the target BS (c) Forward Handoff (iii) First Generation Analog Cellular System (d) Hard Handoff (iv) Second Generation Digital Cellular System (iii) (iv) (ii) (i) (ii) (iii) (i) (iv) (ii) (i) (iv) (iii) (iv) (iii) (i) (ii) _____________________________________________________________________________________ A smart modem can dial, hangup and answer incoming calls automatically. Can you tell who provides the appropriate instructions to the modem for this purpose ? Communication software Error detection protocols Link access procedure (LAP) Telecommunications _____________________________________________________________________________________ What is the size (in terms of bits) of Header length field in IPV4 header ? 2 4 8 16 _____________________________________________________________________________________ Frequency shift keying is used mostly in Radio transmission Telegraphy Telephone None of the above _____________________________________________________________________________________ X.25 is ________ Network
http://www.computersciencemcq.com/pratice_test_deatil.aspx[5/15/2013 2:51:08 PM]
Computer Science MCQ Practice Test Connection Oriented Network Connection Less Network Either Connection Oriented or Connection Less Neither Connection Oriented nor Connection Less _____________________________________________________________________________________ An Internet Service Provider (ISP) has the following chunk of CIDR-based IP addresses available with it: 245.248.128.0/20. The ISP wants to give half of this chunk of addresses to Organization A, and a quarter to Organization B, while retaining the remaining with itself. Which of the following is a valid allocation of addresses to A and B? 245.248.136.0/21 and 245.248.128.0/22 245.248.128.0/21 and 245.248.128.0/22 245.248.132.0/22 and 245.248.132.0/21 245.248.136.0/24 and 245.248.132.0/21 _____________________________________________________________________________________ Which of the following device is used to connect two systems especially if the systems use different protocols? Hub Bridge Gateway Repeater _____________________________________________________________________________________ Which of the following TCP/IP Internet protocol is diskless machine uses to obtain its IP address from a server ? RAP RIP ARP X.25 _____________________________________________________________________________________ Which of the following types of channels moves data relatively slowly? Wideband channel Voiceband channel Narrowband channel Broadband channel _____________________________________________________________________________________ Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol) Transport layer Data link layer Network layer Application layer _____________________________________________________________________________________ You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new subnets very soon. You would like to still allow for the largest possible number of host IDs per subnet. Which subnet mask should you assign? 255.254.0.0 255.240.0.0 255.248.0.0 255.252.0.0 _____________________________________________________________________________________ Which of the following switching techniques is most suitable for interactive traffic ? Circuit switching Message switching Packet switching All of the above _____________________________________________________________________________________ In case of Bus/Tree topology signal balancing issue is overcome by Modulation Polling Segmentation Strong transmitter _____________________________________________________________________________________ Which of the following can be used for clustering of data ? Single layer perception Multilayer perception Self organizing map Radial basis function _____________________________________________________________________________________ When you ping the loopback address, a packet is sent where? Down through the layers of the IP architecture and then up the layers again Across the wire On the network Through the loopback dongle _____________________________________________________________________________________ The addressing especially used by Transport Layer is Station address Network address Application port address Dialog address _____________________________________________________________________________________ What part of 192.168.10.51 is the Network ID, assuming a default subnet mask? 192.0.0.1 192.168.10 255.255.255.0 0.0.0.5 _____________________________________________________________________________________
Jagdish Garg Mob no 9814177781
http://www.computersciencemcq.com/pratice_test_deatil.aspx[5/15/2013 2:51:08 PM]
Submit
Score 0/50marks
View more...
Comments