Data Communication Online MCQs With Answers

We have compiled very important and most repeated questions for Data Communication Online MCQs which are asked in academic as well as in different exams. Most importantly our Online MCQs will help you to evaluate and check your knowledge of computer and IT basics. These Computer Knowledge MCQs will help you to crack any competitive or academic exams. 

Youth For Pakistan has provided an excellent opportunity for the students to prepare for their Computer Knowledge Online MCQs test. These Online Computer Knowledge MCQs cover all the topics including MS Powerpoint, MS Word, MS Excel, Information Technology, Hardware, Internet, Operating Systems, Keyboard Shortcuts, Network, Data Structure, DBMS, Security, Abbreviations, Computer Graphics, Output, Memory, Electronics, Input, Marketing, File Location, File Extensions, Software, Programming, Computer Basics, Windows, Binary, Discrete Mathematics, Data Communication, Compiler and OOPS.

The questions about computers are asked in almost every test whether it is for admission to some institutes or for recruitment purposes. 

Data Communication Online MCQs with Answers

We strongly recommend to all of our visitors that they attempt these Data Communication Online MCQs tests more than one time after completing the preparation so that they can prepare for the Data Communication MCQs in the best possible way.

1. Working of the WAN generally involves?
Satellitesrc=
Frame delaysrc=
ATMsrc=
All of above
None of the abovesrc=
Correct Ans: All of above

2. Which of the following is used for modulation and demodulation?
Modem
Protocols
Gateway
Multiplexer
None of the above
Correct Ans: Multiplexer

3. What is the other name of a LAN card?
 
Modem
NIC
Network connector
Internet card
None of the above
Correct Ans: NIC

4. In file transfer protocol, data transfer can be done in ______
stream mode
block mode
compressed mode
all of the mentioned
None of the above
Correct Ans: all of the mentioned

5. In FTP protocol, client contacts server using ____ as the transport protocol.
transmission control protocol
user datagram protocol
datagram congestion control protocol
stream control transmission protocol
None of the above
Correct Ans: transmission control protocol

6. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits
96 to 127
0 to 63
80 to 95
64 to 79
None of the above
Correct Ans: 96 to 127

Bits 96 to 127 in the datagram represents obfuscated 1Pv4 address.
7. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by intervening IPv4 routers. The best solution here is
use dual-stack approach
Tunneling
No solution
Replace the system
None of the above
Correct Ans: Tunneling

8. The ____ field determines the lifetime of IPv6 datagram
Hop limit
TTL
Next header
All of the mentioned
None of the above
Correct Ans: Hop limit

The Hop limit value is decremented by one by a router when the datagram is forwarded by the router. When the value becomes zero the datagram is discarded.
9. These are the features present in IPv4 but not in IPv6.
Fragmentation
Header checksum
Options
All of the mentioned
None of the above
Correct Ans: All of the mentioned

10. In the IPv6 header,the traffic class field is similar to which field in the IPv4 header?
Fragmentation field
Fast-switching
ToS field
Option field
None of the above
Correct Ans: ToS field

11. The header length of an IPv6 datagram is _____.
10 bytes
25 bytes
30 bytes
40 bytes
None of the above
Correct Ans: 40 bytes

IPv6 datagram has fixed header length of 40 bytes, which results in faster processing of the datagram.
12. The size of IP address in IPv6 is
4 bytes
128 bits
8 bytes
100 bits
None of the above
Correct Ans: 128 bits

13. Which field helps to check rearrangement of the fragments?
offset
flag
TTL
identifier
None of the above
Correct Ans: offset

offset field specifies where the fragment fits in the original datagram.
14. Fragmentation has following demerits
complicates routers
open to DOS attack
overlapping of fragments
All of the mentioned
None of the above
Correct Ans: All of the mentioned

Fragmentation makes the implementation complex and also can create DOS attack
15. If the value in protocol field is 17, the transport layer protocol used is ____
TCP
UDP
Either (a) or (b)
FTP
None of the above
Correct Ans: UDP

16. The TTL field has value 10. How many routers (max) can process this datagram?
11
5
10
1
None of the above
Correct Ans: 10

TTL field is decremented by one each time the datagram is processed by a router.
17. Which of the following field in IPv4 datagram is not related to fragmentation?
Flags
Offset
TOS
Identifier
None of the above
Correct Ans: TOS

18. Which of the following is not applicable for IP?
Error reporting
Handle addressing conventions
Datagram format
Packet handling conventions
None of the above
Correct Ans: Error reporting

19. Which of the following is present in both an HTTP request line and a status line?
HTTP version number
URL
Method
All of the mentioned
None of the above
Correct Ans: HTTP version number

20. The conditional GET mechanism
Imposes conditions on the objects to be requested
Limits the number of response from a server
Helps to keep a cache upto date
All of the mentioned
None of the above
Correct Ans: Helps to keep a cache upto date

Leave a Comment