Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
241
In asynchronous transmission, the gap time between bytes is:
Answer:
Variable
Asynchronous transmission sends data one character at a time, and the interval between characters can be of variable length.
242
Which of these allows access to remote computers?
Answer:
Telnet
Telnet is a network protocol that allows access to remote systems via command-line.
243
What is a set of guidelines that networked computers use for communication?
Answer:
Protocol
A protocol defines how data transmission occurs and ensures reliable communication between devices.
244
In cyclic redundancy checking, what does CRC represent?
Answer:
The remainder
The CRC value is the remainder of a polynomial division of the data, which is appended to the message for error checking.
245
Which layer handles breaking files into packets for transmission over the internet?
Answer:
Transmission Control Protocol
TCP segments data from the application layer into packets for transmission and reassembles them at the destination.
246
In IEEE 802.11, a station with \_\_ mobility is stationary or moves only inside a BSS.
Answer:
No-transition
No-transition mobility means the wireless station does not move out of the range of its current Basic Service Set.
247
In Bluetooth, multiple \_\_\_\_ form a network called a \_\_\_\_.
Answer:
Piconets; scatternet
A piconet is a small Bluetooth network, and multiple interconnected piconets form a larger network known as a scatternet.
248
In IEEE 802.11, a BSS without an access point is called:
Answer:
An ad hoc network
An ad hoc network allows wireless devices to communicate directly with each other without a central access point.
249
A network that encrypts internet traffic for privacy is called:
Answer:
Virtual Private Network
VPNs allow secure data transfer across public networks by encryption.
250
Which file transfer protocol uses TCP and creates two virtual circuits between local and remote servers?
Answer:
FTP
FTP (File Transfer Protocol) uses two separate TCP connections: one for control commands and another for the actual data transfer.