MCQOPTIONS
Saved Bookmarks
This section includes 32 Mcqs, each offering curated multiple-choice questions to sharpen your Master of Computer Applications (MCA) knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Communication between a computer and a keyboard involves ______________ transmission. |
| A. | simplex |
| B. | half-duplex |
| C. | full-duplex |
| D. | automatic |
| Answer» B. half-duplex | |
| 2. |
In _______ transmission, the channel capacity is shared by both communicating devices at all times. |
| A. | simplex |
| B. | half-duplex |
| C. | full-duplex |
| D. | half-simplex |
| Answer» D. half-simplex | |
| 3. |
_______ are special-interest groups that quickly test, evaluate, and standardize new technologies. |
| A. | Forums |
| B. | Regulatory agencies |
| C. | Standards organizations |
| D. | All of the above |
| Answer» B. Regulatory agencies | |
| 4. |
Which organization has authority over interstate and international commerce in the communications field? |
| A. | ITU-T |
| B. | IEEE |
| C. | FCC |
| D. | ISOC |
| Answer» D. ISOC | |
| 5. |
Which agency developed standards for physical connection interfaces and electronic signaling specifications? |
| A. | EIA |
| B. | ITU-T |
| C. | ANSI |
| D. | ISO |
| Answer» B. ITU-T | |
| 6. |
_______ refers to the structure or format of the data, meaning the order in which they are presented. |
| A. | Semantics |
| B. | Syntax |
| C. | Timing |
| D. | All of the above |
| Answer» C. Timing | |
| 7. |
________ defines how a particular pattern to be interpreted, and what action is to be taken based on that interpretation. |
| A. | Semantics |
| B. | Syntax |
| C. | Timing |
| D. | None of the above |
| Answer» B. Syntax | |
| 8. |
UDP does not add anything to the services of IP except for providing _______ communication. |
| A. | node-to-node |
| B. | process-to-process |
| C. | host-to-host |
| D. | none of the above |
| Answer» C. host-to-host | |
| 9. |
Although there are several ways to achieve process-to-process communication, the most common is through the __________ paradigm. |
| A. | client-server |
| B. | client-client |
| C. | server-server |
| D. | none of the above |
| Answer» B. client-client | |
| 10. |
The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers. They are called the ________ ports. |
| A. | well-known |
| B. | registered |
| C. | dynamic |
| D. | none of the above |
| Answer» D. none of the above | |
| 11. |
The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________. |
| A. | UDP addresses |
| B. | transport addresses |
| C. | port addresses |
| D. | none of the above |
| Answer» D. none of the above | |
| 12. |
UDP needs the _______ address to deliver the user datagram to the correct application process. |
| A. | port |
| B. | application |
| C. | internet |
| D. | none of the above |
| Answer» B. application | |
| 13. |
________ means to prove the identity of the entity that tries to access the system's resources. |
| A. | Message authentication |
| B. | Entity authentication |
| C. | Message confidentiality |
| D. | none of the above |
| Answer» C. Message confidentiality | |
| 14. |
The idea of address aggregation was designed to alleviate the increase in routing table entries when using ________. |
| A. | classful addressing |
| B. | classless addressing |
| C. | both a and b |
| D. | none of the above |
| Answer» C. both a and b | |
| 15. |
The principle of ________ states that the routing table is sorted from the longest mask to the shortest mask. |
| A. | first mask matching |
| B. | shortest mask matching |
| C. | longest mask matching |
| D. | none of the above |
| Answer» D. none of the above | |
| 16. |
Which one of the following is an internet standard protocol for managing devices on IP network? |
| A. | dynamic host configuration protocol |
| B. | simple network management protocol |
| C. | internet message access protocol |
| D. | media gateway protocol |
| Answer» C. internet message access protocol | |
| 17. |
Which is also known as a connectionless protocol for a packet-switching network that uses the Datagram approach? |
| A. | IPV5 |
| B. | IPV4 |
| C. | IPV6 |
| D. | None of these |
| Answer» C. IPV6 | |
| 18. |
_______codes are special linear block codes with one extra property. If a codeword is rotated, the result is another codeword. |
| A. | Non-linear |
| B. | Convolution |
| C. | Cyclic |
| D. | none of the above |
| Answer» D. none of the above | |
| 19. |
Which sublayer of the data link layer performs data link functions that depend upon the type of medium? |
| A. | logical link control sublayer |
| B. | media access control sublayer |
| C. | network interface control sublayer |
| D. | none of the above |
| Answer» C. network interface control sublayer | |
| 20. |
When 2 or more bits in a data unit has been changed during the transmission, the error is called |
| A. | random error |
| B. | burst error |
| C. | inverted error |
| D. | none |
| Answer» C. inverted error | |
| 21. |
The data link layer takes the packets from _____ and encapsulates them into frames for transmission. |
| A. | network layer |
| B. | physical layer |
| C. | transport layer |
| D. | application layer |
| Answer» B. physical layer | |
| 22. |
If r is the number of data elements carried per signal element, N is the data rate, and S is the signal rate, then |
| A. | S= N x r |
| B. | S = N/r |
| C. | N = S x r x r |
| D. | None of the above |
| Answer» C. N = S x r x r | |
| 23. |
Bit stuffing means adding an extra 0 to the data section of the frame when there is a sequence of bits with the same pattern as the ________. |
| A. | Header |
| B. | Trailer |
| C. | Flag |
| D. | None of the above |
| Answer» D. None of the above | |
| 24. |
_______ control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. |
| A. | Flow |
| B. | Error |
| C. | Transmission |
| D. | None of the above |
| Answer» B. Error | |
| 25. |
Transport layer aggregates data from different applications into a single stream before passing it to |
| A. | network layer |
| B. | data link layer |
| C. | application layer |
| D. | physical layer |
| Answer» B. data link layer | |
| 26. |
The physical layer translates logical communication requests from the ______ into hardware specific operations. |
| A. | data link layer |
| B. | network layer |
| C. | trasnport layer |
| D. | application layer |
| Answer» B. network layer | |
| 27. |
Ethernet uses a ______ physical address that is imprinted on the network interface card (NIC). |
| A. | 32-bit |
| B. | 64-bit |
| C. | 6-byte |
| D. | none of the above |
| Answer» D. none of the above | |
| 28. |
The ________ address, also known as the link address, is the address of a node as defined by its LAN or WAN. |
| A. | port |
| B. | physical |
| C. | logical |
| D. | none of the above |
| Answer» C. logical | |
| 29. |
_______ is a process-to-process protocol that adds only port addresses, checksum error control, and length information to the data from the upper layer. |
| A. | TCP |
| B. | UDP |
| C. | IP |
| D. | none of the above |
| Answer» C. IP | |
| 30. |
Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter. |
| A. | confidentiality |
| B. | integrity |
| C. | authentication |
| D. | none of the above |
| Answer» D. none of the above | |
| 31. |
_______ refers to two characteristics: when data should be sent and how fast it can be sent. |
| A. | Semantics |
| B. | Syntax |
| C. | Timing |
| D. | none of the above |
| Answer» D. none of the above | |
| 32. |
The_________ layer is responsible for the delivery of a message from one process to another. |
| A. | physical |
| B. | transport |
| C. | network |
| D. | none of the above |
| Answer» C. network | |