Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
Filter by Categories
nmims post
Objective Type Set
Online MCQ Assignment
Question Solution
Solved Question
Uncategorized

Computer Networks MCQ Set 1

1. The physical memory is not as large as the address space spanned by the processor.
a) True
b) False

View Answer

Answer: a [Reason:] This is one of the main reasons for the usage of virtual memories.

2. The program is divided into operable parts called as _________
a) Frames
b) Segments
c) Pages
d) Sheets

View Answer

Answer: b [Reason:] The program is divided into parts called as segments for ease of execution.

3. The techniques which move the program blocks to or from the physical memory is called as ______
a) Paging
b) Virtual memory organisation
c) Overlays
d) Framing

View Answer

Answer: b [Reason:] By using this technique the program execution is accomplished with usage of less space.

4. The binary address issued to data or instructions are called as ______
a) Physical address
b) Location
c) Relocatable address
d) Logical address

View Answer

Answer: d [Reason:] The logical address is the random address generated by the processor.

5. __________is used to implement virtual memory organisation.
a) Page table
b) Frame table
c) MMU
d) None of the mentioned

View Answer

Answer: c [Reason:] The MMU stands for Memory Management Unit.

6. ______ translates logical address into physical address.
a) MMU
b) Translator
c) Compiler
d) Linker

View Answer

Answer: a [Reason:] The MMU translates the logical address into physical address by adding an offset.

7. The main aim of virtual memory organisation is
a) To provide effective memory access
b) To provide better memory transfer
c) To improve the execution of the program
d) All of the mentioned

View Answer

Answer: d [Reason:] None.

8. The DMA doesn’t make use of the MMU for bulk data transfers.
a) True
b) False

View Answer

Answer: b [Reason:] The DMA stands for Direct Memory Access,in which a block of data gets directly transferred from the memory.

9. The virtual memory basically stores the next segment of data to be executed on the _________
a) Secondary storage
b) Disks
c) RAM
d) ROM

View Answer

Answer: a [Reason:] None.

10. The asscociatively mapped virtual memory makes use of _______
a) TLB
b) Page table
c) Frame table
d) None of the mentioned

View Answer

Answer: a [Reason:] TLB stands for Translation Look-aside Buffer.

Computer Networks MCQ Set 2

1. VLIW stands for
a) Very Long Instruction Word
b) Very Long Instruction Width
c) Very Large Instruction Word
d) Very Long Instruction Width

View Answer

Answer: a [Reason:] It is the architecture designed to perform multiple operations in parallel.

2. The important feature of the VLIW is _______
a) ILP
b) Cost effectiveness
c) Performance
d) None of the mentioned

View Answer

Answer: a [Reason:] ILP stands for Instruction Level Parallelism.

3. The main difference between the VLIW and the other approaches to improve performance is
a) Cost effectiveness
b) Increase in performance
c) Lack of complex hardware design
d) All of the mentioned

View Answer

Answer: c [Reason:] The Pipe-lining and super-scalar architectures involved the usage of complex hardware circuits for the implementation.

4. In VLIW the decision for the order of execution of the instructions depends on the program itself.
a) True
b) False

View Answer

Answer: a [Reason:] In other words the order of execution of instructions has nothing to do with the physical hardware implementation of the system.

5. The parallel execution of operations in VLIW is done according to the schedule determined by _____
a) Task scheduler
b) Interpreter
c) Compiler
d) Encoder

View Answer

Answer: c [Reason:] The compiler first checks the code for inter dependencies and then determines the schedule for its execution.

6. The VLIW processors are much simpler as they don not require of _____
a) Computational register
b) Complex logic circuits
c) SSD slots
d) Scheduling hardware

View Answer

Answer: d [Reason:] As the compiler only decides the schedule of execution the scheduler is not required here.

7. The VLIW architecture follows _____ approach to achieve parallelism.
a) MISD
b) SISD
c) SIMD
d) MIMD

View Answer

Answer: d [Reason:] The MIMD stands for Multiple Instructions Multiple Data.

8. The following instruction is allowed in VLIW:
f12 = f0 * f4, f8 = f8 + f12, f0 = dm(i0, m3), f4 = pm(i8, m9);
a) True
b) False

View Answer

Answer: a [Reason:] The above mentioned instruction is a complex 48 bit instruction used to perform operations on floating numbers.

9. To compute the direction of the branch the VLIW uses _____
a) Seekers
b) Heuristics
c) Direction counter
d) Compass

View Answer

Answer: b [Reason:] None.

10. EPIC stands for
a) Explicitly Parallel Instruction Computing
b) External Peripheral Integrating Component
c) External Parallel Instruction Computing
d) None of the mentioned

View Answer

Answer: a [Reason:] None.

Computer Networks MCQ Set 3

1. This is not a application layer protocol
a) HTTP
b) SMTP
c) FTP
d) TCP

View Answer

Answer: d [Reason:] TCP is transport layer protocol

2. The packet of information at the application layer is called
a) Packet
b) Message
c) Segment
d) Frame

View Answer

Answer: b [Reason:] None.

3. This is one of the architecture paradigm
a) Peer to peer
b) Client-server
c) HTTP
d) Both Peer-to-Peer & Client-Server

View Answer

Answer: d [Reason:] HTTP is a protocol.

4. Application developer has permission to decide the following on transport layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both of the mentioned
d) None of the mentioned

View Answer

Answer: c [Reason:] None.

5. Application layer offers _______ service
a) End to end
b) Process to process
c) Both of the mentioned
d) None of the mentioned

View Answer

Answer: a [Reason:] None.

6. E-mail is
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned

View Answer

Answer: c [Reason:] Because it can work with available throughput.

7. Pick the odd one out
a) File transfer
b) File download
c) E-mail
d) Interactive games

View Answer

Answer: d [Reason:] Internet telephony is Loss-tolerant other applications are not.

8. Which of the following is an application layer service ?
a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) All of the mentioned

View Answer

Answer: d [Reason:] None.

9. To deliver a message to the correct application program running on a host, the _______ address must be consulted
a) IP
b) MAC
c) Port
d) None of the mentioned

View Answer

Answer: c [Reason:] None.

10. This is a time-sensitive service
a) File transfer
b) File download
c) E-mail
d) Internet telephony

View Answer

Answer: d [Reason:] Internet telephony is Loss-tolerant other applications are not.

11. Transport services available to applications in one or another form
a) Reliable data transfer
b) Timing
c) Security
d) All of the mentioned

View Answer

Answer: d [Reason:] None.

12. Electronic mail uses this Application layer protocol
a) SMTP
b) HTTP
c) FTP
d) SIP

View Answer

Answer: a [Reason:] None.

Computer Networks MCQ Set 4

1. The number of objects in a Web page which consists of 4 jpeg images and HTML text is ________
a) 4
b) 1
c) 5
d) None of the mentioned

View Answer

Answer: c [Reason:] 4 jpeg images + 1 base HTML file.

2. The default connection type used by HTTP is _________
a) Persistent
b) Non-persistent
c) Can be either persistent or non-persistent depending on connection request
d) None of the mentioned

View Answer

Answer: a [Reason:] None.

3. The time taken by a packet to travel from client to server and then back to the client is called __________
a) STT
b) RTT
c) PTT
d) None of the mentioned

View Answer

Answer: b [Reason:] RTT stands for round-trip time.

4. The HTTP request message is sent in _________ part of three-way handshake.
a) First
b) Second
c) Third
d) None of the mentioned

View Answer

Answer: c [Reason:] None.

5. In the process of fetching a web page from a server the HTTP request/response takes __________ RTTs.
a) 2
b) 1
c) 4
d) 3

View Answer

Answer: b [Reason:] None.

6. The first line of HTTP request message is called _____________
a) Request line
b) Header line
c) Status line
d) Entity line

View Answer

Answer: a [Reason:] The line followed by request line are called header lines and status line is the initial part of response message.

7. The values GET, POST, HEAD etc are specified in ____________ of HTTP message
a) Request line
b) Header line
c) Status line
d) Entity body

View Answer

Answer: a [Reason:] It is specified in the method field of request line in the HTTP request message.

8. The __________ method when used in the method field, leaves entity body empty.
a) POST
b) SEND
c) GET
d) None of the mentioned

View Answer

Answer: c [Reason:] None.

9. The HTTP response message leaves out the requested object when ____________ method is used
a) GET
b) POST
c) HEAD
d) PUT

View Answer

Answer: c [Reason:] None.

10. Find the oddly matched HTTP status codes
a) 200 OK
b) 400 Bad Request
c) 301 Moved permanently
d) 304 Not Found

View Answer

Answer: d [Reason:] 404 Not Found.

11. Which of the following is not correct ?
a) Web cache doesnt has its own disk space
b) Web cache can act both like server and client
c) Web cache might reduce the response time
d) Web cache contains copies of recently requested objects

View Answer

Answer: a [Reason:] None.

12. The conditional GET mechanism
a) Imposes conditions on the objects to be requested
b) Limits the number of response from a server
c) Helps to keep a cache upto date
d) None of the mentioned

View Answer

Answer: c [Reason:] None.

13. Which of the following is present in both an HTTP request line and a status line?
a) HTTP version number
b) URL
c) Method
d) None of the mentioned

View Answer

Answer: a [Reason:] None.

Computer Networks MCQ Set 5

1. The sharing of a medium and its link by two or more devices is called _________
a) Fully duplexing
b) Multiplexing
c) Both a and b
d) None of the mentioned

View Answer

Answer: b [Reason:] None.

2. Multiplexing is used in _______
a) Packet switching
b) Circuit switching
c) Data switching
d) None of the mentioned

View Answer

Answer: b [Reason:] None.

3. Which multiplexing technique transmits digital signals ?
a) FDM
b) TDM
c) WDM
d) None of the mentioned

View Answer

Answer: b [Reason:] FDM and WDM are used in analog signals.

4. If there are n signal sources of same data rate than TDM link has _______ slots
a) n
b) n/2
c) n*2
d) 2n

View Answer

Answer: a [Reason:] Each slot is dedicated to one of the source.

5. If link transmits 4000frames per second, and each slot has 8 bits,the transmission rate of circuit this TDM is
a) 32kbps
b) 500bps
c) 500kbps
d) None of the mentioned

View Answer

Answer: a [Reason:] Transmission rate= frame rate * number os bits in a slot.

6. The state when dedicated signals are idle are called
a) Death period
b) Poison period
c) Silent period
d) None of the mentioned

View Answer

Answer: c [Reason:] None.

7. Multiplexing can provide
a) Efficiency
b) Privacy
c) Anti jamming
d) Both Efficiency & Privacy

View Answer

Answer: d [Reason:] None.

8. In TDM, the transmission rate of the multiplexed path is usually _______ the sum of the transmission rates of the signal sources.
a) Greater than
b) Lesser than
c) Equal to
d) Equal to or greater than

View Answer

Answer: a [Reason:] None.

9. In TDM, slots are further divided into
a) Seconds
b) Frames
c) Packets
d) None of the mentioned

View Answer

Answer: b [Reason:] None.