A directory of Objective Type Questions covering all the Computer Science subjects. Here you can access and discuss Multiple choice questions and answers for various compitative exams and interviews.

1. The GSM network is divided into the following three major systems :
a. SS, BSS, OSS
b. BSS, BSC, MSC
c. CELL, BSC, OSS
d. SS, CELL, MSC
View Answer Report Discuss Too Difficult! Search Google
Answer: (a).SS, BSS, OSS

2. The Mobile Application Protocol (MAP) typically runs on top of which protocol ?
a. SNMP (Simple Network Management Protocol)
b. SMTP (Simple Mail Transfer Protocol)
c. SS7 (Signalling System 7)
d. HTTP (Hyper Text Transfer Protocol)
View Answer Report Discuss Too Difficult! Search Google
Answer: (c).SS7 (Signalling System 7)

3. If a packet arrive with an M-bit value is  '1' and a fragmentation offset value '0', then it is ______ fragment.
a. First
b. Middle
c. Last
d. All of the above
View Answer Report Discuss Too Difficult! Search Google
Answer: (a).First

4. The design issue of Datalink Layer in OSI Reference Model is
a. Framing
b. Representation of bits
c. Synchronization of bits
d. Connection control
View Answer Report Discuss Too Difficult! Search Google
Answer: (a).Framing

5. Coaxial cables are categorized by Radio Government rating are adapted for specialized functions. Category RG-59 with impedance 75Ω used for
a. Cable TV
b. Ethernet
c. Thin Ethernet
d. Thick Ethernet
View Answer Report Discuss Too Difficult! Search Google
Answer: (a).Cable TV

6. AES is a round cipher based on the Rijndal Algorithm that uses a 128-bit block of data. AES has three different configurations. ______ rounds with a key size of 128 bits, ______ rounds with a key size of 192 bits and ______ rounds with a key size of 256 bits.
a. 5, 7, 15
b. 10, 12, 14
c. 5, 6, 7
d. 20, 12, 14
View Answer Report Discuss Too Difficult! Search Google
Answer: (b).10, 12, 14

7. Data Encryption Techniques are particularly used for _______.
a. protecting data in Data Communication System
b. reduce Storage Space Requirement
c. enhances Data Integrity
d. decreases Data Integrity
View Answer Report Discuss Too Difficult! Search Google
Answer: (a).protecting data in Data Communication System

8. An example of a layer that is absent in broadcast networks is:
a. Physical layer
b. Presentation layer
c. Network layer
d. Application layer
View Answer Report Discuss Too Difficult! Search Google
Answer: (c).Network layer

9. The ATM cell is
a. 48 bytes long
b. 53 bytes long
c. 64 bytes long
d. 69 bytes long
View Answer Report Discuss Too Difficult! Search Google
Answer: (b).53 bytes long

10. The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is known as
a. Bit stuffing
b. Piggy backing
c. Pipelining
d. Broadcasting
View Answer Report Discuss Too Difficult! Search Google
Answer: (b).Piggy backing

Page 1 of 30