Computer Networks MCQ Set 1
1. The physical memory is not as large as the address space spanned by the processor.
a) True
b) False
Answer
Answer: a [Reason:]
2. The program is divided into operable parts called as _________
a) Frames
b) Segments
c) Pages
d) Sheets
Answer
Answer: b [Reason:]
3. The techniques which move the program blocks to or from the physical memory is called as ______
a) Paging
b) Virtual memory organisation
c) Overlays
d) Framing
Answer
Answer: b [Reason:]
4. The binary address issued to data or instructions are called as ______
a) Physical address
b) Location
c) Relocatable address
d) Logical address
Answer
Answer: d [Reason:]
5. __________is used to implement virtual memory organisation.
a) Page table
b) Frame table
c) MMU
d) None of the mentioned
Answer
Answer: c [Reason:]
6. ______ translates logical address into physical address.
a) MMU
b) Translator
c) Compiler
d) Linker
Answer
Answer: a [Reason:]
7. The main aim of virtual memory organisation is
a) To provide effective memory access
b) To provide better memory transfer
c) To improve the execution of the program
d) All of the mentioned
Answer
Answer: d [Reason:]
8. The DMA doesn’t make use of the MMU for bulk data transfers.
a) True
b) False
Answer
Answer: b [Reason:]
9. The virtual memory basically stores the next segment of data to be executed on the _________
a) Secondary storage
b) Disks
c) RAM
d) ROM
Answer
Answer: a [Reason:]
10. The asscociatively mapped virtual memory makes use of _______
a) TLB
b) Page table
c) Frame table
d) None of the mentioned
Answer
Answer: a [Reason:]
Computer Networks MCQ Set 2
1. VLIW stands for
a) Very Long Instruction Word
b) Very Long Instruction Width
c) Very Large Instruction Word
d) Very Long Instruction Width
Answer
Answer: a [Reason:]
2. The important feature of the VLIW is _______
a) ILP
b) Cost effectiveness
c) Performance
d) None of the mentioned
Answer
Answer: a [Reason:]
3. The main difference between the VLIW and the other approaches to improve performance is
a) Cost effectiveness
b) Increase in performance
c) Lack of complex hardware design
d) All of the mentioned
Answer
Answer: c [Reason:]
4. In VLIW the decision for the order of execution of the instructions depends on the program itself.
a) True
b) False
Answer
Answer: a [Reason:]
5. The parallel execution of operations in VLIW is done according to the schedule determined by _____
a) Task scheduler
b) Interpreter
c) Compiler
d) Encoder
Answer
Answer: c [Reason:]
6. The VLIW processors are much simpler as they don not require of _____
a) Computational register
b) Complex logic circuits
c) SSD slots
d) Scheduling hardware
Answer
Answer: d [Reason:]
7. The VLIW architecture follows _____ approach to achieve parallelism.
a) MISD
b) SISD
c) SIMD
d) MIMD
Answer
Answer: d [Reason:]
8. The following instruction is allowed in VLIW:
f12 = f0 * f4, f8 = f8 + f12, f0 = dm(i0, m3), f4 = pm(i8, m9);
a) True
b) False
Answer
Answer: a [Reason:]
9. To compute the direction of the branch the VLIW uses _____
a) Seekers
b) Heuristics
c) Direction counter
d) Compass
Answer
Answer: b [Reason:]
10. EPIC stands for
a) Explicitly Parallel Instruction Computing
b) External Peripheral Integrating Component
c) External Parallel Instruction Computing
d) None of the mentioned
Answer
Answer: a [Reason:]
Computer Networks MCQ Set 3
1. This is not a application layer protocol
a) HTTP
b) SMTP
c) FTP
d) TCP
Answer
Answer: d [Reason:] TCP is transport layer protocol
2. The packet of information at the application layer is called
a) Packet
b) Message
c) Segment
d) Frame
Answer
Answer: b [Reason:] None.
3. This is one of the architecture paradigm
a) Peer to peer
b) Client-server
c) HTTP
d) Both Peer-to-Peer & Client-Server
Answer
Answer: d [Reason:] HTTP is a protocol.
4. Application developer has permission to decide the following on transport layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both of the mentioned
d) None of the mentioned
Answer
Answer: c [Reason:] None.
5. Application layer offers _______ service
a) End to end
b) Process to process
c) Both of the mentioned
d) None of the mentioned
Answer
Answer: a [Reason:] None.
6. E-mail is
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
Answer
Answer: c [Reason:] Because it can work with available throughput.
7. Pick the odd one out
a) File transfer
b) File download
c) E-mail
d) Interactive games
Answer
Answer: d [Reason:] Internet telephony is Loss-tolerant other applications are not.
8. Which of the following is an application layer service ?
a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) All of the mentioned
Answer
Answer: d [Reason:] None.
9. To deliver a message to the correct application program running on a host, the _______ address must be consulted
a) IP
b) MAC
c) Port
d) None of the mentioned
Answer
Answer: c [Reason:] None.
10. This is a time-sensitive service
a) File transfer
b) File download
c) E-mail
d) Internet telephony
Answer
Answer: d [Reason:] Internet telephony is Loss-tolerant other applications are not.
11. Transport services available to applications in one or another form
a) Reliable data transfer
b) Timing
c) Security
d) All of the mentioned
Answer
Answer: d [Reason:] None.
12. Electronic mail uses this Application layer protocol
a) SMTP
b) HTTP
c) FTP
d) SIP
Answer
Answer: a [Reason:] None.
Computer Networks MCQ Set 4
1. The number of objects in a Web page which consists of 4 jpeg images and HTML text is ________
a) 4
b) 1
c) 5
d) None of the mentioned
Answer
Answer: c [Reason:] 4 jpeg images + 1 base HTML file.
2. The default connection type used by HTTP is _________
a) Persistent
b) Non-persistent
c) Can be either persistent or non-persistent depending on connection request
d) None of the mentioned
Answer
Answer: a [Reason:] None.
3. The time taken by a packet to travel from client to server and then back to the client is called __________
a) STT
b) RTT
c) PTT
d) None of the mentioned
Answer
Answer: b [Reason:] RTT stands for round-trip time.
4. The HTTP request message is sent in _________ part of three-way handshake.
a) First
b) Second
c) Third
d) None of the mentioned
Answer
Answer: c [Reason:] None.
5. In the process of fetching a web page from a server the HTTP request/response takes __________ RTTs.
a) 2
b) 1
c) 4
d) 3
Answer
Answer: b [Reason:] None.
6. The first line of HTTP request message is called _____________
a) Request line
b) Header line
c) Status line
d) Entity line
Answer
Answer: a [Reason:] The line followed by request line are called header lines and status line is the initial part of response message.
7. The values GET, POST, HEAD etc are specified in ____________ of HTTP message
a) Request line
b) Header line
c) Status line
d) Entity body
Answer
Answer: a [Reason:] It is specified in the method field of request line in the HTTP request message.
8. The __________ method when used in the method field, leaves entity body empty.
a) POST
b) SEND
c) GET
d) None of the mentioned
Answer
Answer: c [Reason:] None.
9. The HTTP response message leaves out the requested object when ____________ method is used
a) GET
b) POST
c) HEAD
d) PUT
Answer
Answer: c [Reason:] None.
10. Find the oddly matched HTTP status codes
a) 200 OK
b) 400 Bad Request
c) 301 Moved permanently
d) 304 Not Found
Answer
Answer: d [Reason:] 404 Not Found.
11. Which of the following is not correct ?
a) Web cache doesnt has its own disk space
b) Web cache can act both like server and client
c) Web cache might reduce the response time
d) Web cache contains copies of recently requested objects
Answer
Answer: a [Reason:] None.
12. The conditional GET mechanism
a) Imposes conditions on the objects to be requested
b) Limits the number of response from a server
c) Helps to keep a cache upto date
d) None of the mentioned
Answer
Answer: c [Reason:] None.
13. Which of the following is present in both an HTTP request line and a status line?
a) HTTP version number
b) URL
c) Method
d) None of the mentioned
Answer
Answer: a [Reason:] None.
Computer Networks MCQ Set 5
1. The sharing of a medium and its link by two or more devices is called _________
a) Fully duplexing
b) Multiplexing
c) Both a and b
d) None of the mentioned
Answer
Answer: b [Reason:] None.
2. Multiplexing is used in _______
a) Packet switching
b) Circuit switching
c) Data switching
d) None of the mentioned
Answer
Answer: b [Reason:] None.
3. Which multiplexing technique transmits digital signals ?
a) FDM
b) TDM
c) WDM
d) None of the mentioned
Answer
Answer: b [Reason:] FDM and WDM are used in analog signals.
4. If there are n signal sources of same data rate than TDM link has _______ slots
a) n
b) n/2
c) n*2
d) 2n
Answer
Answer: a [Reason:] Each slot is dedicated to one of the source.
5. If link transmits 4000frames per second, and each slot has 8 bits,the transmission rate of circuit this TDM is
a) 32kbps
b) 500bps
c) 500kbps
d) None of the mentioned
Answer
Answer: a [Reason:] Transmission rate= frame rate * number os bits in a slot.
6. The state when dedicated signals are idle are called
a) Death period
b) Poison period
c) Silent period
d) None of the mentioned
Answer
Answer: c [Reason:] None.
7. Multiplexing can provide
a) Efficiency
b) Privacy
c) Anti jamming
d) Both Efficiency & Privacy
Answer
Answer: d [Reason:] None.
8. In TDM, the transmission rate of the multiplexed path is usually _______ the sum of the transmission rates of the signal sources.
a) Greater than
b) Lesser than
c) Equal to
d) Equal to or greater than
Answer
Answer: a [Reason:] None.
9. In TDM, slots are further divided into
a) Seconds
b) Frames
c) Packets
d) None of the mentioned
Answer
Answer: b [Reason:] None.