A directory of Objective Type Questions covering all the Computer Science subjects. Here you can access and discuss Multiple choice questions and answers for various compitative exams and interviews.

71. Frame boundaries are recognized and created by ....................
a. Application layer
b. Data Link layer
c. Session layer
d. Network layer
View Answer Report Discuss Too Difficult! Search Google
Answer: (c).Session layer

72. Token Management is the function of ....................
a. Application layer
b. Data Link layer
c. Session layer
d. Network layer
View Answer Report Discuss Too Difficult! Search Google
Answer: (d).Network layer

73. The function of Physical Layer?
a. Error correction and Detection
b. Piggybacking
c. Flow Control
d. Determine number of volts to represent 1 or 0
View Answer Report Discuss Too Difficult! Search Google
Answer: (d).Determine number of volts to represent 1 or 0

74. As the data packet moves from the lower to the upper layers then headers are?
a. added
b. subtracted
c. rearranged
d. modified
View Answer Report Discuss Too Difficult!
Answer: (a).added

75. In OSI network architecture, the routing is performed by ..................
a. network layer
b. data link layer
c. transport layer
d. session layer
View Answer Report Discuss Too Difficult! Search Google
Answer: (a).network layer

76. How many OSI layers are covered in the X.25 standard?
a. Two
b. Three
c. Seven
d. Six
View Answer Report Discuss Too Difficult! Search Google
Answer: (b).Three

77. Layer one of the OSI model is .................
a. physical layer
b. link layer
c. transport layer
d. internet work layer
View Answer Report Discuss Too Difficult! Search Google
Answer: (a).physical layer

78. The X.25 standard specifies a ...............
a. technique for start-stop data
b. technique for dial access
c. DTE/DCE interface
d. None of above
View Answer Report Discuss Too Difficult! Search Google
Answer: (c).DTE/DCE interface

79. Which of the following are session layer check points?
a. allow just a portion of a file to be resent
b. detect and recover errors
c. control the addition of headers
d. are involved in dialog control
View Answer Report Discuss Too Difficult! Search Google
Answer: (a).allow just a portion of a file to be resent

80. Which of the following technique is used for encapsulation?
a. one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size
b. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
c. a technique used in best-effort delivery systems to avoid endlessly looping packets
d. all of the above
View Answer Report Discuss Too Difficult!
Answer: (b).a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame