Explore topic-wise MCQs in Bachelor of Sc in Information Technology.

This section includes 113 Mcqs, each offering curated multiple-choice questions to sharpen your Bachelor of Sc in Information Technology knowledge and support exam preparation. Choose a topic below to get started.

1.

The …………….. of A TSI controls the order of delivering of slot values that are stored in RAM.

A. cross bar
Answer» E.
2.

In a time division switch, a ……………… governs the destination of a packet stored in RAM.

A. tdm bus
Answer» E.
3.

The PSTN is an example of …………….. network.

A. packet-switched
B. circuit-switched
C. message-switched
Answer» C. message-switched
4.

A repeater takes a weakened or corrupted signal and …………… it.

A. amplifies
B. regenerates
C. resample
Answer» C. resample
5.

Source routing bridges in the same LANs must have …………… bridge Number.

A. same
B. different
C. source
Answer» C. source
6.

The DNS name space is divided into non overlapping ………………….

A. regions
Answer» E.
7.

In ………………. transmission, the channel capacity is shared by both communicating devices at all times.

A. simplex
B. half-duplex
C. full-duplex
Answer» D.
8.

The address field of a frame in HDLC protocol contains the address of the ……………… station.

A. primary
B. secondary
C. tertiary
Answer» C. tertiary
9.

FDDI is an acronym for ……………

A. fast data delivery interface
B. fiber distributed data interface
C. fiber distributed digital interface
Answer» C. fiber distributed digital interface
10.

In ………………… each packet of a message need not follow the same path From sender to receiver.

A. circuit switching
Answer» E.
11.

LANs can be connected by a device called ……………..

A. routers
Answer» E.
12.

Sending of a IP packet from host 1 to host 2 where both are of same LAN but the packet is transferred through different intermediate LANs is called ………………

A. tunnelling
B. routing
C. diverting
Answer» B. routing
13.

The first collision free protocol is ……………….

A. binary countdown
B. basic bitmap
C. reservation protocol
Answer» C. reservation protocol
14.

Terminals are required for ……………..

A. real-time, batch processing & time-sharing
Answer» E.
15.

For applications such as audio and video streaming, the variation in the packet arrival times is called ……………..

A. random early detection
B. jitter
C. delay difference
Answer» C. delay difference
16.

Flow control policy is implemented in ………………….

A. network layer
B. transport layer
C. application layer
Answer» C. application layer
17.

If the buffer fills and a packet segment is dropped, then dropping all the rest of the segments from that packet, since they will be useless anyway is called ………………..

A. priority dropping
B. tail dropping
C. age based dropping
Answer» C. age based dropping
18.

When the source host receives the choke packet, then the source ………………

A. reduces the capacity of the line
B. reduces the line utilization factor
C. reduces the traffic generation
Answer» D.
19.

Upon receipt of a bad segment, UDP …………..

A. it does flow control
Answer» E.
20.

When routers are being inundated by packets that they cannot handle, they just throw them away is known as ……………….

A. jitter control
Answer» E.
21.

The solution to increase the capacity when congestion occurs is …………………

A. denying service to the users
B. degrading the service to the users
C. splitting traffic over multiple routes
Answer» D.
22.

The service of closed loop congestion control technique is ………………

A. when to accept new traffic
B. when to discard the packets
C. monitor the system to detect when and where congestion occurs
Answer» D.
23.

In transport layer, End to End delivery is the movement of data from ……………….

A. one station to the next station
B. one network to the other network
C. source to destination
Answer» D.
24.

In …………… case higher bandwidth can be achieved.

A. connectionless networks
B. connection oriented networks
C. virtual circuit networks
Answer» B. connection oriented networks
25.

The service of open loop congestion control technique is …………………..

A. monitor the system to detect when and where congestion occurs
B. when to accept new traffic
C. pass the information to places where action can be taken
Answer» C. pass the information to places where action can be taken
26.

When too many packets are present in the subnet, and performance degrades then it leads to ………………..

A. ingestion
B. congestion
C. digestion
Answer» C. digestion
27.

..………..is used to validate the identity of the message sender to the recipient

A. encryption
B. decryption
C. digital certificate
Answer» D.
28.

In closed loop congestion control techniques, the decisions are based on the ……………..

A. concept of a feedback loop
B. concept of a forward loop
C. concept of current state of network
Answer» B. concept of a forward loop
29.

In open loop congestion control techniques, the decisions are based on the ……………

A. without regard to the current state of the network
B. with regard to the current state of the network
C. with regard to the choice of the host
Answer» B. with regard to the current state of the network
30.

The solution to decrease the load on the network when congestion occurs is ……………..

A. splitting the traffic over multiple routes
Answer» E.
31.

Packet discard policy is implemented in ……………..

A. physical layer
Answer» E.
32.

What is the routing algorithm used in MANETs?

A. shortest path first
Answer» E.
33.

The hosts who compute on the run and want to maintain their connections as they move around ……………

A. migratory hosts
B. stationary hosts
C. mobile hosts
Answer» D.
34.

The hosts which are basically stationary hosts who move from one fixed site to another from time to time but use the network only when they are physically connected to it are called …………….

A. migratory hosts
B. stationary hosts
C. mobile hosts
Answer» B. stationary hosts
35.

The processes that keep track of all mobile hosts visiting the area is ……………..

A. home agent
B. mobile agent
C. foreign agent
Answer» D.
36.

In distance vector routing algorithm, the routing tables are updated …………………

A. by exchanging information with the neighbours
B. automatically
C. using the backup database
Answer» B. automatically
37.

Sending a packet to all destinations simultaneously is called ……………….

A. multicasting
Answer» E.
38.

In ………………. to send a multicast message a host sends it to the core, which then does the multicast along the spanning tree.

A. core based trees
B. avl trees
C. binary trees
Answer» B. avl trees
39.

To do multicast routing, each router computes a …………………

A. binary tree
B. avl tree
C. spanning tree
Answer» D.
40.

In multicast routing with spanning tree method, a network with n groups, each with an average of m members, for each group we require ………………..

A. n pruned spanning trees must be stored for a total of mn trees
Answer» E.
41.

In distributed applications, it is sometimes necessary to update all the databases concurrently, we use …………………..

A. shortest path first
Answer» E.
42.

If a router sends every incoming packet out only on those lines that are going approximately in the right direction is known as ……………..

A. random flooding
B. static flooding
C. selective flooding
Answer» D.
43.

The Clusters in Hierarchical routing are grouped in to ………………

A. clusters
B. zones
C. blocks
Answer» C. blocks
44.

The regions in Hierarchical routing are grouped in to ……………..

A. clusters
B. zones
C. blocks
Answer» B. zones
45.

In Hierarchical routing, the routers are divided into what is called as ……………..

A. zones
B. cells
C. regions
Answer» D.
46.

The method of network routing where every possible path between transmitting and receiving DTE is used is called ……………

A. random routing
B. packet flooding
C. directory routing
Answer» C. directory routing
47.

……………. do not base their routing decisions on measurements or estimates of the current traffic and topology.

A. non adaptive algorithms
B. adaptive algorithms
C. static algorithms
Answer» B. adaptive algorithms
48.

If router J is on the optimal path from router I to router K, then the optimal path from J to K also falls along the same route is known as ………………..

A. routing principle
B. optimality principle
C. sink tree principle
Answer» C. sink tree principle
49.

…………….. change their routing decisions to reflect changes in the topology.

A. nonadaptive algorithms
B. adaptive algorithms
C. static algorithms
Answer» C. static algorithms
50.

If the subnet uses virtual circuits internally, routing decisions are made only when a new virtual circuit is being setup. This is called as……………..

A. session routing
B. circuit routing
C. datagram routing
Answer» B. circuit routing