MCQOPTIONS
Saved Bookmarks
This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
| 351. |
What is document object model (DOM)? |
| A. | convention for representing and interacting with objects in html documents |
| B. | application programming interface |
| C. | hierarchy of objects in ASP.NET |
| D. | none of the mentioned |
| Answer» B. application programming interface | |
| 352. |
An alternative of javascript on windows platform is |
| A. | VBScript |
| B. | ASP.NET |
| C. | JSP |
| D. | None of the mentioned |
| Answer» B. ASP.NET | |
| 353. |
Which one of the following is not used to generate dynamic web pages? |
| A. | PHP |
| B. | ASP.NET |
| C. | JSP |
| D. | None of the mentioned |
| Answer» E. | |
| 354. |
A web cookie is a small piece of data |
| A. | sent from a website and stored in user’s web browser while a user is browsing a website |
| B. | sent from user and stored in the server while a user is browsing a website |
| C. | sent from root server to all servers |
| D. | none of the mentioned |
| Answer» B. sent from user and stored in the server while a user is browsing a website | |
| 355. |
URL stands for |
| A. | unique reference label |
| B. | uniform reference label |
| C. | uniform resource locator |
| D. | unique resource locator |
| Answer» D. unique resource locator | |
| 356. |
Common gateway interface is used to |
| A. | generate executable files from web content by web server |
| B. | generate web pages |
| C. | stream videos |
| D. | none of the mentioned |
| Answer» B. generate web pages | |
| 357. |
What is a web browser? |
| A. | a program that can display a web page |
| B. | a program used to view html documents |
| C. | it enables user to access the resources of internet |
| D. | all of the mentioned |
| Answer» E. | |
| 358. |
Dynamic web page |
| A. | is same every time whenever it displays |
| B. | generates on demand by a program or a request from browser |
| C. | both is same every time whenever it displays and generates on demand by a program or a request from browser |
| D. | none of the mentioned |
| Answer» C. both is same every time whenever it displays and generates on demand by a program or a request from browser | |
| 359. |
A piece of icon or image on a web page associated with another webpage is called |
| A. | url |
| B. | hyperlink |
| C. | plugin |
| D. | none of the mentioned |
| Answer» C. plugin | |
| 360. |
Frame relay has only |
| A. | physical layer |
| B. | data link layer |
| C. | both physical layer and data link layer |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 361. |
Frame Relay deploys physical layer carriers such as |
| A. | ADMs |
| B. | UPSR |
| C. | BLSR |
| D. | SONET |
| Answer» E. | |
| 362. |
Frame Relay does not provide flow or error control, they must be provided by the |
| A. | Lower Level Protocol |
| B. | High Level Protocol |
| C. | Upper Level Protocol |
| D. | Downward Level Protocol |
| Answer» D. Downward Level Protocol | |
| 363. |
There are ________ total features of Frame Relay. |
| A. | Five |
| B. | Seven |
| C. | Nine |
| D. | Ten |
| Answer» D. Ten | |
| 364. |
Frame Relay networks offer an option called |
| A. | Voice Over For Relay |
| B. | Voice Over Fine Relay |
| C. | Voice On Frame Relay |
| D. | Voice Over Frame Relay |
| Answer» E. | |
| 365. |
Frame Relay is very cheap than other |
| A. | LANs |
| B. | WANs |
| C. | MANs |
| D. | Multipoint Networks |
| Answer» C. MANs | |
| 366. |
What is FRAD in frame relay network? |
| A. | FRAD assembles and disassembles the frames coming from other protocols |
| B. | FRAD is used for modulation and demodulation |
| C. | FRAD is used for error detection |
| D. | None of the mentioned |
| Answer» B. FRAD is used for modulation and demodulation | |
| 367. |
In frame relay networks, extended address is used |
| A. | to increase the range of data link connection identifiers |
| B. | for error detection |
| C. | for encryption |
| D. | for error recovery |
| Answer» B. for error detection | |
| 368. |
Frame relay has |
| A. | only physical layer |
| B. | only data link layer |
| C. | only network layer |
| D. | both physical and data link layer |
| Answer» E. | |
| 369. |
Virtual circuit identifier in frame relay is called |
| A. | data link connection identifier |
| B. | frame relay identifier |
| C. | cell relay identifier |
| D. | none of the mentioned |
| Answer» B. frame relay identifier | |
| 370. |
Frame relay has error detection at the |
| A. | physical layer |
| B. | data link layer |
| C. | network layer |
| D. | transport layer |
| Answer» C. network layer | |
| 371. |
An ATM cell has the payload field of |
| A. | 32 bytes |
| B. | 48 bytes |
| C. | 64 bytes |
| D. | 128 bytes |
| Answer» C. 64 bytes | |
| 372. |
ATM can be used for |
| A. | local area network |
| B. | wide area network |
| C. | any of local or wide area network |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 373. |
ATM standard defines _______ layers. |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» C. 4 | |
| 374. |
ATM uses the |
| A. | asynchronous frequency division multiplexing |
| B. | asynchronous time division multiplexing |
| C. | asynchronous space division multiplexing |
| D. | none of the mentioned |
| Answer» C. asynchronous space division multiplexing | |
| 375. |
ATM and frame relay are |
| A. | virtual circuit networks |
| B. | datagram networks |
| C. | virtual private networks |
| D. | none of the mentioned |
| Answer» B. datagram networks | |
| 376. |
In data transfer phase, the table contains how many columns? |
| A. | 1 |
| B. | 2 |
| C. | 3 |
| D. | 4 |
| Answer» E. | |
| 377. |
In virtual circuit network, delay times for setup and teardown respectively are |
| A. | 1 and 1 |
| B. | 1 and 2 |
| C. | 2 and 1 |
| D. | 2 and 2 |
| Answer» B. 1 and 2 | |
| 378. |
Delay if, resource allocated on demand during data transfer is |
| A. | Constant |
| B. | Increases for each packet |
| C. | Same for each packet |
| D. | Different for each packet |
| Answer» E. | |
| 379. |
Delay if, resource allocated during setup phase during data transfer is |
| A. | Constant |
| B. | Increases for each packet |
| C. | Same for each packet |
| D. | Different for each packet |
| Answer» D. Different for each packet | |
| 380. |
During teardown phase, source after sending all the frames to destination sends……..to notify termination |
| A. | Teardown response |
| B. | Teardown request |
| C. | Termination request |
| D. | Termination response |
| Answer» C. Termination request | |
| 381. |
Steps required in setup process are |
| A. | Setup request and acknowledgement |
| B. | Setup request and setup response |
| C. | Setup request and setup termination |
| D. | Setup and termination steps |
| Answer» B. Setup request and setup response | |
| 382. |
Which of the following is not a phase of virtual circuit network? |
| A. | Setup phase |
| B. | Datatransfer phase |
| C. | Termination phase |
| D. | Teardown phase |
| Answer» D. Teardown phase | |
| 383. |
The Identifier that is used for data transfer in virtual circuit network is |
| A. | Global address |
| B. | Virtual circuit identifier |
| C. | Network identifier |
| D. | IP identifier |
| Answer» C. Network identifier | |
| 384. |
The address that is unique in the scope of the network or internationally if the network is part of an international network is called as |
| A. | Global address |
| B. | Network address |
| C. | Physical address |
| D. | IP address |
| Answer» B. Network address | |
| 385. |
Which of the following is not a characteristic of Virtual Circuit Network? |
| A. | There are setup and teardown phases in addition to the data transfer phase |
| B. | Resources can be allocated during setup phase or on demand |
| C. | All packets follow the same path established during the connection |
| D. | Virtual circuit network is implemented in application layer |
| Answer» E. | |
| 386. |
In the congestion avoidance algorithm, the size of the congestion window increases ____________ until congestion is detected. |
| A. | Exponentially |
| B. | Additively |
| C. | Multiplicatively |
| D. | None of the mentioned |
| Answer» C. Multiplicatively | |
| 387. |
In the slow-start algorithm, the size of the congestion window increases __________ until it reaches a threshold. |
| A. | Exponentially |
| B. | Additively |
| C. | Multiplicatively |
| D. | None of the mentioned |
| Answer» B. Additively | |
| 388. |
The packet sent by a node to the source to inform it of congestion is called |
| A. | Explicit |
| B. | Discard |
| C. | Choke |
| D. | Backpressure |
| Answer» D. Backpressure | |
| 389. |
Backpressure technique can be applied only to |
| A. | Congestion networks |
| B. | Closed circuit networks |
| C. | Open circuit networks |
| D. | Virtual circuit networks |
| Answer» E. | |
| 390. |
The technique in which a congested node stops receiving data from the immediate upstream node or nodes is called as |
| A. | Admission policy |
| B. | Backpressure |
| C. | Forward signalling |
| D. | Backward signalling |
| Answer» C. Forward signalling | |
| 391. |
Closed-Loop control mechanism try to |
| A. | Remove after congestion occurs |
| B. | Remove after sometime |
| C. | Prevent before congestion occurs |
| D. | Prevent before sending packets |
| Answer» B. Remove after sometime | |
| 392. |
Discarding policy is mainly done by |
| A. | Sender |
| B. | Receiver |
| C. | Router |
| D. | Switch |
| Answer» D. Switch | |
| 393. |
In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. whereas in Selective Repeat window, tries to send ___________ |
| A. | Packet that have not lost |
| B. | Packet that have lost or corrupted |
| C. | Packet from starting |
| D. | All the packets |
| Answer» C. Packet from starting | |
| 394. |
Retransmission of packets must be done when |
| A. | Packet is lost |
| B. | Packet is corrupted |
| C. | Packet is needed |
| D. | All of the mentioned |
| Answer» E. | |
| 395. |
In open-loop control, policies are applied to __________ |
| A. | Remove after congestion occurs |
| B. | Remove after sometime |
| C. | Prevent before congestion occurs |
| D. | Prevent before sending packets |
| Answer» D. Prevent before sending packets | |
| 396. |
Two broad categories of congestion control are |
| A. | Open-loop and Closed-loop |
| B. | Open-control and Closed-control |
| C. | Active control and Passive control |
| D. | None of the mentioned |
| Answer» B. Open-control and Closed-control | |
| 397. |
Which of the following organizations is primarily concerned with military encryption systems? |
| A. | NSA |
| B. | NIST |
| C. | IEEE |
| D. | ITU |
| Answer» B. NIST | |
| 398. |
In computer security… means that the information in a computer system only be accessible for reading by authorized parities. |
| A. | Confidentiality |
| B. | Integrity |
| C. | Availability |
| D. | Authenticity |
| Answer» B. Integrity | |
| 399. |
In computer security… means that computer system assets can be modified only by authorized parities. |
| A. | Confidentiality |
| B. | Integrity |
| C. | Availability |
| D. | Authenticity |
| Answer» C. Availability | |
| 400. |
ESP provides |
| A. | source authentication |
| B. | data integrity |
| C. | privacy |
| D. | all of the mentioned |
| Answer» E. | |