0% found this document useful (0 votes)
27 views58 pages

Session-22 Important MCQs Discussion

Uploaded by

Manish Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views58 pages

Session-22 Important MCQs Discussion

Uploaded by

Manish Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 58

Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC) Manjeet Rai -

Computer Science

BPSC TRE - 4.0 & STET


Important
(50 MCQs)
Manjeet Rai - Discussion
Computer Science

Session - 22
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

1. Which layer is responsible for Allowing users to send


data, access data, and use networks?
(A). Session Layer
(B). Network Layer
(C). Application Layer
(D). Transport Layer
(E). None of these
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

2. On which layer SSL is used in OSI model?


(A). Session Layer
(B). Presentation Layer
(C). Application Layer
(D). Transport Layer
(E). None of these
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
• SSL stands for Secure Sockets Layer, a security
protocol that creates an encrypted link between a web
server and a web browser.
• Companies and organizations need to add SSL
certificates to their websites to secure online
transactions and keep customer information private
and secure.
• SSL keeps internet connections secure and prevents
criminals from reading or modifying information
transferred between two systems.
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

3. On which layer IMAP is used in OSI model?


(A). Session Layer
(B). Presentation Layer
(C). Application Layer
(D). Transport Layer
(E). None of these
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
• Internet Message Access Protocol, or IMAP, is a
standard email retrieval (incoming) protocol.
• It stores email messages on a mail server and enables
the recipient to view and manipulate them as though
they were stored locally on their device(s).
• As an incoming email protocol, IMAP functions as the
intermediary between the email server and email
client.
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

4. Which layer is responsible for Encryption and


decryption in the OSI model?
(A). Session Layer
(B). Presentation Layer
(C). Application Layer
(D). Transport Layer
(E). None of these
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

5. On which layer Sockets works in OSI model?


(A). Session Layer
(B). Presentation Layer
(C). Application Layer
(D). Transport Layer
(E). None of these
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
• Sockets in computer networks are used for allowing the
transmission of information between two processes of the
same machines or different machines in the network.
• The socket is the combination of IP address and software
port number used for communication between multiple
processes.
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
6. IPv4 and IPv6 work on which OSI layer?
(A). Session Layer
(B). Presentation Layer
(C). Network Layer
(D). Transport Layer
(E). None of these
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

7. Ethernet works on which OSI layer?


(A). Datalink Layer
(B). Network Layer
(C). Application Layer
(D). Transport Layer
(E). None of these
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
8. Media Access Control (MAC) Layer is a sublayer of
which layer of the OSI model?
(A). Presentation Layer
(B). Network Layer
(C). Application Layer
(D). Datalink Layer
(E). None of these
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
The data link layer is the second lowest layer.
It is divided into two sublayers −
The logical link control (LLC) sublayer
The medium access control (MAC) sublayer
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
• The Logical Link Control (LLC) sublayer provides
the logic for the data link; thus it controls the
synchronization, flow control, and error-checking
functions of the data link layer.
• MAC sublayer is responsible for encapsulating
frames so that they are suitable for transmission via
the physical medium.
• It resolves the addressing of source station as well as
the destination station, or groups of destination
stations.
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
9. Which layer Controls the reliability of a given link
through flow control, segmentation and de-segmentation,
and error control?
(A). Session Layer
(B). Network Layer
(C). Application Layer
(D). Transport Layer
(E). None of these
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
10. Which layer is responsible for multiplexing data
streams, data frame detection, medium access, and error
control?
(A). Session Layer
(B). Network Layer
(C). Data Link Layer
(D). Transport Layer
(E). None of these
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
11. Which layer is Responsible for the communication of
the unstructured raw data streams over a physical
medium?
(A). Session Layer
(B). Network Layer
(C). Physical Layer
(D). Transport Layer
(E). None of these
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
12. Bus, Ring, Star, and Mesh topology works on which
OSI layer?
(A). Datalink Layer
(B). Network Layer
(C). Physical Layer
(D). Transport Layer
(E). None of these
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
13. Communication modes like Simplex, Half Duplex, and
Full Duplex work on which OSI layer?
(A). Datalink Layer
(B). Session Layer
(C). Physical Layer
(D). Transport Layer
(E). None of these
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

14. IP is _________ datagram protocol.


A) an unreliable
B) a connectionless
C) both a and b
D) none of the above
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
15. Which is the ability of a single network to span
multiple physical networks?
A) Subnetting
B) Masking
C) Fragmenting
D) Hopping
E) None of these
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

16. Choose the function of a router


(A). changing the data from one format to another
(B). error detection in data
(C). send the packet to the uplinks
(D). None of the above
(E). Both a and c
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

17. Select the work of the Router to do in a network.


(A). identified on which outing link a packet is to be sent
(B). send a packet to the next free outgoing link
(C). send a packet to all outgoing links
(D). send a packet to all outgoing links except the originated link
(E). All of these
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

18. The Routing tables of a router used to keep?


(A). MAC Address Assignments
(B). Port Assignments to network devices
(C). Distribute IP address to network devices
(D). The routes for forwarding the data to its destination
(E). All of these
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
19. Select the size of the Source and Destination IP address in
the IP header.
(A). 4 bits
(B). 32 bits
(C). 16 bits
(D). 8 bits
(E). both a and c
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
20. Which one is the natural mask for a class C Network?
(A). 255.255.255.1
(B). 255.255.255.255
(C). 255.255.255.254
(D). 255.255.255.0
(E). None of these
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
21. Which utility used, If you want to find the number of
routers between a source and destination.
(A). route
(B). Traceroute
(C). Ifconfig
(D). Ipconfig
(E). Both a and b
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

22. IP address 200.200.200.200 is IP of which class?


A. Class C
B. Class D
C. Class A
D. Class B
E. both A & B
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
23. Optical Fiber transmit______.
A. light signal
B. radio signal
C. electrical signal
D. Both A and B
E. None of these
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

24. HTTPs port number used is______.


A. 43
B. 441
C. 443
D. 449
E. Both A and B
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

25. Which is not social media network?


(A). Facebook
(B). Wikipedia
(C). Twitter
(D). LinkedIn
(E). None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

26. Which is the largest social media network in the


world?
(A). Twitter
(B). Wikipedia
(C). Facebook
(D). LinkedIn
(E). None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
27. one of the following is a ratio of the number of
successful calls to the number of call attempts.
A. Busy Hour Call Rate
B. Call Block Rate
C. Call Completion Rate
D. None of these
E. None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
28. Three or more than 3 computers share a link in
________ connection
a) Point to point
b) Unipoint
c) Multipoint
d) All
e) None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
29. Which topology covers the factors like security,
robustness and eliminating traffic?
A) Bus
B) Star
C) Mesh
D) Ring
E) None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

30. FDDI used the ……… topology?


A) Star
B) Bus
C) Ring
D) All
E) None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

31. The IEEE 802.11 defines basic service set as a


building block of wireless is…
A. WAN
B. LAN
C. MAN
D. All of these
E. None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
32. WPA stands for?
A. wired protected access
B. wi-fi protected access
C. wi-fi process access
D. wired process access
E. None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
33. WLAN device is installed in or attached to a PC to
provide an interface to a wireless network is
__________.
A. Access Point
B. Network Adaptor
C. Repeater
D. Antenna
E. None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
34. Which term is used to describe the ability to network
devices from different manufacturers to communicate
effectively?
A. Scalable
B. Interoperable
C. Accessible
D. Portable
E. None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

35. McAfee is an example of


A. Photo Editing Software
B. Quick Heal
C. Virus
D. Antivirus
E. None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
36. Which of the following is not done by cyber
criminals?
(a) Unauthorized account access
(b) Mass attack using Trojans as botnets
(c) Email spoofing and spamming
(d) Report vulnerability in any system
(e) None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
37. What is the name of the IT law that India is having
in the Indian legislature?
a) India’s Technology (IT) Act, 2000
b) India’s Digital Information Technology (DIT) Act,
2000
c) India’s Information Technology (IT) Act, 2000
d) The Technology Act, 2008
e) None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

38. The first computer virus is ——–


A. I Love You
B. Blaster
C. Sasser
D. Creeper
E. None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

39. The Internet service that issue a multimedia


interface to current resources is called
A. World Wide Web
B. Gopher
C. File Transfer Protocol
D. Telnet
E. None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
40. which define correctly ICMP Internet Control Message
Protocol?
a. A redirect message is used when a router notices that a
packet seems to have been routed wrongly.
b. It reports all errors which occur during transmission
c. It informs routers when an incorrect path has been taken.
d. The “destination unreachable” type message is used when a
router cannot locate the destination.
e. None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

41. What is the punishment in India for stealing computer


documents, assets or any software’s source code from any
organization, individual, or from any other means?
(a) 6 months of imprisonment and a fine of Rs. 50,000
(b) 1 year of imprisonment and a fine of Rs. 100,000
(c) 2 years of imprisonment and a fine of Rs. 250,000
(d) 3 years of imprisonment and a fine of Rs. 500,000
(e) None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

42. IPv6 address length


a. 32 bits
b. 128 bits
c. 64 bits
d. 256 bits
e. None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

43. Select the wrong class.


(A) CLASS A = 1 to 126
(B) CLASS C = 192 to 220
(C) CLASS B = 128 to 191
(D) CLASS D = 224 to 239
(E) None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
44. Select the stands for IANA stands.
(A) Internal Associative Numbers Authority
(B) Internal Assigned Numbers Authority
(C) Internet Associative Numbers Authoritative
(D) Internet Assigned Numbers Authority
(E) None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

45. RIR stands for ________


a) Regional Internal Registries
b) Registries Internet Regional
c) Regional Internet Registries
d) Registries Internal Regional
e) None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

46. Which one are the stands of VLSM?


(A) Version Length Subnet Masking
(B) Version Length Surface Masking
(C) Variable Length Surface Masking
(D) Variable Length Subnet Masking
(E) None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
47. A language that provides a set of operations to support the
basic data manipulation operations on the data held in the
database is known as.
a) DML
b) DLD
c)DLL
d) DDL
e) None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
48. Data manipulation operations includes the following
operations:
a) modification of data stored in the database
b) insertion of new data into the database
c) deletion of data from the database
d) All mentioned
e) None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science
49. The definition of Data Model is…
a) Represent the conceptual schema that can be understood
by the DBMS.
b) Consisting of a set of rules for database construction.
c) Data model constraints, which ensures that the data is
accurate
d)Concepts for describing and manipulating the data,
relationships and constraints of data.
e) None
Manjeet Rai -
Subscribe Manjeet Rai- Computer Science (Complete Solution for BPSC)
Computer Science

50. Who proposed the relational model?


a) Charles Babbage
b) Bill Gates
c) Herman Hollerith
d) E.F Codd
e) None
Like

Share
Manjeet Rai -
Computer Science Subscribe

You might also like