Home
MCQS
MCA MCQ Quiz Hub
Computer Network MCA Question MCQ Set 8
Choose a topic to test your knowledge and improve your MCA skills
1. Two broad categories of congestion control are
Open-loop and Closed-loop
Open-control and Closed-control
Active control and Passive control
Active control and Passive control
2. In open-loop control, policies are applied to _____
Remove after congestion occurs
Remove after sometime
Prevent before congestion occurs
Prevent before sending packets
3. Retransmission of packets must not be done when _______
Packet is lost
Packet is corrupted
Packet is needed
Packet is error-free
4. In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. Whereas in Selective Repeat window, the sender resends _______
Packet which are not lost
Only those packets which are lost or corrupted
Packet from starting
All the packets
5. Discarding policy is mainly done by _____
Sender
Receiver
Router
Switch
6. Closed-Loop control mechanisms try to _____
Remove after congestion occurs
Remove after sometime
Prevent before congestion occurs
Prevent before sending packets
7. The technique in which a congested node stops receiving data from the immediate upstream node or nodes is called as _______
Admission policy
Backpressure
Forward signaling
Backward signaling
8. Backpressure technique can be applied only to _______
Congestion networks
Closed circuit networks
Open circuit networks
Virtual circuit networks
9. The packet sent by a node to the source to inform it of congestion is called _______
Explicit
Discard
Choke
Backpressure
10. In the slow-start algorithm, the size of the congestion window increases __________ until it reaches a threshold.
exponentially
additively
multiplicatively
suddenly
11. In the congestion avoidance algorithm, the size of the congestion window increases ______ until congestion is detected.
exponentially
additively
multiplicatively
suddenly
12. Which of the following is not a characteristic of Virtual Circuit Network?
There are setup and teardown phases in addition to the data transfer phase
Resources can be allocated during setup phase or on demand
All packets follow the same path established during the connection
Virtual circuit network is implemented in application layer
13. The address that is unique in the scope of the network or internationally if the network is part of an international network is called as ______
Global address
Network address
Physical address
IP address
14. The Identifier that is used for data transfer in virtual circuit network is called _______
Global address
Virtual circuit identifier
Network identifier
IP identifier
15. Which of the following is not a phase of virtual circuit network?
Setup phase
Data transfer phase
Termination phase
Teardown phase
16. Steps required in setup process are _____
Setup request and acknowledgement
Setup request and setup response
Setup request and setup termination
Setup and termination steps
17. During teardown phase, the source, after sending all the frames to destination, sends a _____ to notify termination.
teardown response
teardown request
termination request
termination response
18. Delay of the resource allocated during setup phase during data transfer is ________
constant
increases for each packet
same for each packet
different for each packet
19. Delay of the resource allocated on demand during data transfer is ________
constant
increases for each packet
same for each packet
different for each packet
20. In virtual circuit network, the number of delay times for setup and teardown respectively are _______
1 and 1
1 and 2
2 and 1
2 and 2
21. In data transfer phase, how many columns does the table contain?
1
2
3
4
22. ATM and frame relay are ________
virtual circuit networks
datagram networks
virtual private networks
virtual public networks
23. ATM uses _______
asynchronous frequency division multiplexing
asynchronous time division multiplexing
asynchronous space division multiplexing
asynchronous amplitude division multiplexing
24. ATM standard defines _______ layers.
2
3
4
5
25. ATM can be used for ________
local area network
wide area network
campus area network
networks covering any range
26. An ATM cell has the payload field of _________
32 bytes
48 bytes
64 bytes
128 bytes
27. Frame relay has error detection at the ______
physical layer
data link layer
network layer
transport layer
28. Virtual circuit identifier in frame relay is called ______
data link connection identifier
frame relay identifier
cell relay identifier
circuit connection identifier
29. In frame relay networks, extended address is used _______
to increase the range of data link connection identifiers
for error detection
for encryption
for error recovery
30. What is FRAD in frame relay network?
FRAD assembles and disassembles the frames coming from other protocols
FRAD is used for modulation and demodulation
FRAD is used for error detection
FRAD is used for error recovery
31. Frame Relay is cheaper than other _____
LANs
WANs
MANs
Multipoint Networks
32. Frame Relay networks offer an option called _______
Voice Over For Relay
Voice Over Fine Relay
Voice On Frame Relay
Voice Over Frame Relay
33. There are ________ total features of Frame Relay.
Five
Seven
Nine
Ten
34. Frame Relay does not provide flow or error control, they must be provided by the ______
Lower Level Protocol
Highest Level Protocol
Upper Level Protocol
Lowest Level Protocol
35. Frame Relay deploys physical layer carriers such as _______
ADMs
UPSR
BLSR
SONET
36. Frame relay provides error detection at the ______
physical layer
data link layer
network layer
transport layer
37. Virtual circuit identifier in frame relay is called _______
data link connection identifier
frame relay identifier
cell relay identifier
circuit connection identifier
38. Frame relay has only _______
physical layer
data link layer
physical layer and data link layer
network layer and data link layer
39. In frame relay networks, extended address is used ________
to increase the range of data link connection identifiers
for error detection
for encryption
for error recovery
40. A piece of icon or image on a web page associated with another webpage is called ______
url
hyperlink
hyperlink
extension
41. Dynamic web page ______
is same every time whenever it displays
generates on demand by a program or a request from browser
both is same every time whenever it displays and generates on demand by a program or a request from browser
is different always in a predefined order
42. What is a web browser?
a program that can display a web page
a program used to view html documents
it enables user to access the resources of internet
All of the mentioned
43. Common gateway interface is used to _______
generate executable files from web content by web server
generate web pages
stream videos
download media files
44. URL stands for ________
unique reference label
uniform reference label
uniform resource locator
unique resource locator
45. A web cookie is a small piece of data that is _______
sent from a website and stored in user’s web browser while a user is browsing a website
sent from user and stored in the server while a user is browsing a website
sent from root server to all servers
sent from the root server to other root servers
46. Which one of the following is not used to generate dynamic web pages?
PHP
ASP.NET
JSP
CSS
47. An alternative to JavaScript on windows platform is _______
VBScript
ASP.NET
JSP
php
48. What is document object model (DOM)?
convention for representing and interacting with objects in html documents
application programming interface
hierarchy of objects in ASP.NET
scripting language
49. AJAX stands for _______
asynchronous javascript and xml
advanced JSP and xml
asynchronous JSP and xml
advanced javascript and xml
50. Which of the following is not applicable for IP?
Error reporting
Handle addressing conventions
Datagram format
Packet handling conventions
Submit