Online Exam Preparation
MCQs Library
Browse subject-wise multiple choice questions, review answers quickly, and start a test from the same section.
Questions
| Code | Question | Option A | Option B | Option C | Option D | Answer |
|---|---|---|---|---|---|---|
| CS601 |
Tunneling Is A Technique In Which The Ip Datagram Is First And Then
|
Encapsulated In Another Datagram; Encrypted
|
Encrypted; Encapsulated In Another Datagram
|
Authenticated; Encrypted
|
Encrypted; Authenticated
|
B |
| CS601 |
Udp And Tcp Are Both Layer Protocols
|
Physical
|
Data Link
|
Network
|
Transport
|
D |
| CS601 |
Udp Needs The Address To Deliver The User Datagram To The Correct Application Program
|
Application
|
Internet
|
Physical
|
Port
|
D |
| CS601 |
Unipolar Bipolar And Polar Encoding Are Types Of Encoding
|
Block
|
Line
|
Nrz
|
Manchester
|
B |
| CS601 |
Updates For A Satellites Coordinates Can Be Obtained On The Www. This Is Probably A(N) Document
|
Passive
|
Dynamic
|
Active
|
Static
|
B |
| CS601 |
Urgent Data Require The Urgent Pointer Field As Well As The Urg Bit In The Field
|
Sequence Number
|
Control
|
Offset
|
Reserved
|
B |
| CS601 |
Uses Multicast Link State Routing Concepts To Create Source-Based Trees
|
Dvmrp
|
Cbt
|
Bvd
|
Mospf
|
D |
| CS601 |
Using The Shannon Formula To Calculate The Data Rate For A Given Channel If C = B Then __________
|
The Signal Is Equal To The Noise
|
The Signal Is Less Than The Noise
|
The Signal Is Greater Than The Noise
|
Not Enough Information Is Given To Answer The Question
|
A |
| CS601 |
Vlan Technology Divides A Lan Into Groups
|
Multiplexed
|
Framed
|
Physical
|
Logical
|
D |
| CS601 |
Voice Over Ip Is A(N) __________ Audio/Video Application
|
Interactive
|
Streaming Stored
|
Streaming Live
|
None Of The Above
|
A |
| CS601 |
Was Designed As An Alternative To The T-1 Line
|
Vdsl
|
Sdsl
|
Hdsl
|
Adsl
|
C |
| CS601 |
Wavelength Is __________ Proportional To Propagation Speed And __________ Proportional To Period
|
Directly; Directly
|
Inversely; Directly
|
Directly; Inversely
|
Inversely; Inversely
|
A |
| CS601 |
We Use A Cryptography Method In Which The Character Z Always Substitutes For The Character G. This Is Probably
|
Polyalphabetic Substitution
|
Transpositional
|
Monoalphabetic Substitution
|
None Of The Above
|
C |
| CS601 |
We Use An Cryptography Method In Which The Plaintext Aaaaaa Becomes The Ciphertext Bcdefg. This Is Probably
|
Monoalphabetic Substitution
|
Transposition
|
Polyalphabetic Substitution
|
None Of The Above
|
C |
| CS601 |
What Are The Components Of A Browser?
|
Controller Client Program Interpreter
|
Retrieval Method Host Computer Path Name
|
Hypertext Hypermedia Html
|
All The Above
|
A |
| CS601 |
What Does The Url Need To Access A Document?
|
Path Name
|
Host Computer
|
Retrieval Method
|
All The Above
|
D |
| CS601 |
What Is Needed To Determine The Number Of The Last Byte Of A Fragment?
|
Identification Number
|
Offset Number
|
Total Length
|
(B) And ©
|
D |
| CS601 |
What Is Present In All Hdlc Control Fields?
|
N(R)
|
N(S)
|
Code Bits
|
P/F Bit
|
D |
| CS601 |
What Is The Bandwidth Of A Signal That Ranges From 40 Khz To 4 Mhz?
|
3.96 Mhz
|
36 Mhz
|
360 Khz
|
396 Khz
|
A |
| CS601 |
What Is The Basic Access Method For Wireless Lans As Defined By Ieee 802.11?
|
Llc
|
Pcf
|
Dcf
|
Bfd
|
C |