Explore topic-wise MCQs in Master of Computer Applications (MCA).

This section includes 32 Mcqs, each offering curated multiple-choice questions to sharpen your Master of Computer Applications (MCA) knowledge and support exam preparation. Choose a topic below to get started.

1.

Communication between a computer and a keyboard involves ______________ transmission.

A. simplex
B. half-duplex
C. full-duplex
D. automatic
Answer» B. half-duplex
2.

In _______ transmission, the channel capacity is shared by both communicating devices at all times.

A. simplex
B. half-duplex
C. full-duplex
D. half-simplex
Answer» D. half-simplex
3.

_______ are special-interest groups that quickly test, evaluate, and standardize new technologies.

A. Forums
B. Regulatory agencies
C. Standards organizations
D. All of the above
Answer» B. Regulatory agencies
4.

Which organization has authority over interstate and international commerce in the communications field?

A. ITU-T
B. IEEE
C. FCC
D. ISOC
Answer» D. ISOC
5.

Which agency developed standards for physical connection interfaces and electronic signaling specifications?

A. EIA
B. ITU-T
C. ANSI
D. ISO
Answer» B. ITU-T
6.

_______ refers to the structure or format of the data, meaning the order in which they are presented.

A. Semantics
B. Syntax
C. Timing
D. All of the above
Answer» C. Timing
7.

________ defines how a particular pattern to be interpreted, and what action is to be taken based on that interpretation.

A. Semantics
B. Syntax
C. Timing
D. None of the above
Answer» B. Syntax
8.

UDP does not add anything to the services of IP except for providing _______ communication.

A. node-to-node
B. process-to-process
C. host-to-host
D. none of the above
Answer» C. host-to-host
9.

Although there are several ways to achieve process-to-process communication, the most common is through the __________ paradigm.

A. client-server
B. client-client
C. server-server
D. none of the above
Answer» B. client-client
10.

The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers. They are called the ________ ports.

A. well-known
B. registered
C. dynamic
D. none of the above
Answer» D. none of the above
11.

The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________.

A. UDP addresses
B. transport addresses
C. port addresses
D. none of the above
Answer» D. none of the above
12.

UDP needs the _______ address to deliver the user datagram to the correct application process.

A. port
B. application
C. internet
D. none of the above
Answer» B. application
13.

________ means to prove the identity of the entity that tries to access the system's resources.

A. Message authentication
B. Entity authentication
C. Message confidentiality
D. none of the above
Answer» C. Message confidentiality
14.

The idea of address aggregation was designed to alleviate the increase in routing table entries when using ________.

A. classful addressing
B. classless addressing
C. both a and b
D. none of the above
Answer» C. both a and b
15.

The principle of ________ states that the routing table is sorted from the longest mask to the shortest mask.

A. first mask matching
B. shortest mask matching
C. longest mask matching
D. none of the above
Answer» D. none of the above
16.

Which one of the following is an internet standard protocol for managing devices on IP network?

A. dynamic host configuration protocol
B. simple network management protocol
C. internet message access protocol
D. media gateway protocol
Answer» C. internet message access protocol
17.

Which is also known as a connectionless protocol for a packet-switching network that uses the Datagram approach?

A. IPV5
B. IPV4
C. IPV6
D. None of these
Answer» C. IPV6
18.

_______codes are special linear block codes with one extra property. If a codeword is rotated, the result is another codeword.

A. Non-linear
B. Convolution
C. Cyclic
D. none of the above
Answer» D. none of the above
19.

Which sublayer of the data link layer performs data link functions that depend upon the type of medium?

A. logical link control sublayer
B. media access control sublayer
C. network interface control sublayer
D. none of the above
Answer» C. network interface control sublayer
20.

When 2 or more bits in a data unit has been changed during the transmission, the error is called

A. random error
B. burst error
C. inverted error
D. none
Answer» C. inverted error
21.

The data link layer takes the packets from _____ and encapsulates them into frames for transmission.

A. network layer
B. physical layer
C. transport layer
D. application layer
Answer» B. physical layer
22.

If r is the number of data elements carried per signal element, N is the data rate, and S is the signal rate, then

A. S= N x r
B. S = N/r
C. N = S x r x r
D. None of the above
Answer» C. N = S x r x r
23.

Bit stuffing means adding an extra 0 to the data section of the frame when there is a sequence of bits with the same pattern as the ________.

A. Header
B. Trailer
C. Flag
D. None of the above
Answer» D. None of the above
24.

_______ control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment.

A. Flow
B. Error
C. Transmission
D. None of the above
Answer» B. Error
25.

Transport layer aggregates data from different applications into a single stream before passing it to

A. network layer
B. data link layer
C. application layer
D. physical layer
Answer» B. data link layer
26.

The physical layer translates logical communication requests from the ______ into hardware specific operations.

A. data link layer
B. network layer
C. trasnport layer
D. application layer
Answer» B. network layer
27.

Ethernet uses a ______ physical address that is imprinted on the network interface card (NIC).

A. 32-bit
B. 64-bit
C. 6-byte
D. none of the above
Answer» D. none of the above
28.

The ________ address, also known as the link address, is the address of a node as defined by its LAN or WAN.

A. port
B. physical
C. logical
D. none of the above
Answer» C. logical
29.

_______ is a process-to-process protocol that adds only port addresses, checksum error control, and length information to the data from the upper layer.

A. TCP
B. UDP
C. IP
D. none of the above
Answer» C. IP
30.

Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.

A. confidentiality
B. integrity
C. authentication
D. none of the above
Answer» D. none of the above
31.

_______ refers to two characteristics: when data should be sent and how fast it can be sent.

A. Semantics
B. Syntax
C. Timing
D. none of the above
Answer» D. none of the above
32.

The_________ layer is responsible for the delivery of a message from one process to another.

A. physical
B. transport
C. network
D. none of the above
Answer» C. network