Data Communication MCQs | Interview Questions and Answers | Basic Computer Knowledge


The commands, from client to server, and replies, from server to client, are sent across the control connection in ____ bit ASCII format

   A.) 8
   B.) 7
   C.) 3
   D.) 5

Answer: Option 'B'



Eight stations are competing for the use of a shared channel using the 'Adaptive tree Walk Protocol'. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are needed to resolve the contention?

   A.) 7 slots
   B.) 5 slots
   C.) 14 slots
   D.) 10 slots

Answer: Option 'A'

7 slots


If the client receives an address from a DHCP server, what is the only information available in the Network Properties dialog box?

   A.) The IP address
   B.) The subnet address
   C.) That the client is receiving its address from DHCP
   D.) The default gateway

Answer: Option 'C'

That the client is receiving its address from DHCP


The 32-bit internet address 10000000 00001010 00000010 00011110 will be written in dotted decimal notation as


Answer: Option 'D'


With an IP address starting at 200, you currently have 10 subnets. What subnet mask should you use to maximize the number of available hosts?

   A.) 192
   B.) 224
   C.) 240
   D.) 248

Answer: Option 'C'



User agent does not support this

   A.) Composing messages
   B.) Reading messages
   C.) Replying messages
   D.) All of the mentioned

Answer: Option 'D'

All of the mentioned


If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the modulation rate is

   A.) 1200 bands
   B.) 3200 bands
   C.) 9600 bands
   D.) 4800 bands

Answer: Option 'B'

3200 bands


Which of the following is a security protocol designed to provide a wireless LAN with better security and privacy?

   A.) WAP
   B.) WEP
   C.) LDAP
   D.) SNMP

Answer: Option 'A'



When you connect to an online information service, you are asked to provide some kind of identification such as your name, an account number and a password. What is the name given to this brief dialogue between you and the information system?

   A.) Security procedure
   B.) Log-on procedure
   C.) Safeguard procedure
   D.) Identification procedure

Answer: Option 'B'

Log-on procedure


The CCITT Recommendation X.25 specifies three layers of communications:

   A.) application, presentation and session
   B.) physical datalink and network
   C.) Session, transport and network
   D.) datalink, network and transport

Answer: Option 'B'

physical datalink and network


In the IPv6 header,the traffic class field is similar to which field in the IPv4 header?

   A.) Fragmentation field
   B.) ToS field
   C.) Fast-switching
   D.) Option field

Answer: Option 'B'

​ToS field


In Wireless LAN's, a time interval between two frames to control access to the channel is called _____

   A.) Interframe space
   B.) Interior routing
   C.) Interleaving
   D.) Interchannel space

Answer: Option 'A'

Interframe space


In OSI model, as the data packet moves from the upper to the lower layers, headers are _______

   A.) added
   B.) deleted
   C.) removed
   D.) edited

Answer: Option 'A'



Which of the following communications service provides message preparation and transmission facilities?

   A.) Teletex
   B.) Teletext
   C.) x400
   D.) Fax

Answer: Option 'A'



Automatic repeat request error management mechanism is provided by

   A.) logical link control sublayer
   B.) media access control sublayer
   C.) network interface control sublayer
   D.) All of these

Answer: Option 'A'

logical link control sublayer


Which of the following is used for modulation and demodulation?

   A.) Modem
   B.) Multiplexer
   C.) Protocols
   D.) Gateway

Answer: Option 'B'



An internetworking protocol that provides virtual circuit service across multiple X.25 protocol, is

   A.) X.75
   B.) X.400
   C.) X.25
   D.) X.21

Answer: Option 'A'



A SMTP session may include

   A.) zero SMTP transaction
   B.) one SMTP transaction
   C.) more than one SMTP transaction
   D.) all of the mentioned

Answer: Option 'D'

all of the mentioned


The 32-bit internet address 10000000 00001010 00000010 00011110 will be written in dotted decimal notation as


Answer: Option 'D'


Which of the following is not correct?

   A.) Web cache does not has its own disk space
   B.) Web cache might reduce the response time
   C.) Web cache can act both like server and client
   D.) Web cache contains copies of recently requested objects

Answer: Option 'A'

Web cache does not has its own disk space

Data Communication MCQs Download Pdf