Computer Architecture And Organization Set 10
On This Page
This set of Computer Architecture and Organization Multiple Choice Questions & Answers (MCQs) focuses on Computer Architecture And Organization Set 10
Q1 | Beyond IP, UDP provides additional services such as
- routing and switching
- sending and receiving of packets
- multiplexing and demultiplexing
- demultiplexing and error checking
Q2 | What is the main advantage of UDP?
- more overload
- reliable
- low overhead
- fast
Q3 | What is the header size of a UDP packet?
- 8 bytes
- 8 bits
- 16 bytes
- 124 bytes
Q4 | The port number is “ephemeral port number”, if the source host is
- ntp
- echo
- server
- client
Q5 | “Total length” field in UDP packet header is the length of
- only udp header
- only data
- only checksum
- udp header plus data
Q6 | Which is the correct expression for the length of UDP datagram?
- udp length = ip length – ip header’s length
- udp length = udp length – udp header’s length
- udp length = ip length + ip header’s length
- udp length = udp length + udp header’s length
Q7 | The field is used to detect errors over the entire user datagram.
- udp header
- checksum
- source port
- destination port
Q8 | Which of the following is false with respect to TCP?
- connection-oriented
- process-to-process
- transport layer protocol
- unreliable
Q9 | In TCP, sending and receiving data is done as
- stream of bytes
- sequence of characters
- lines of data
- packets
Q10 | TCP groups a number of bytes together into a packet called
- packet
- buffer
- segment
- stack
Q11 | Communication offered by TCP is
- full-duplex
- half-duplex
- semi-duplex
- byte by byte
Q12 | Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment?
- 10000
- 10001
- 12001
- 11001
Q13 | Bytes of data being transferred in each connection are numbered by TCP. These numbers start with a
- fixed number
- random sequence of 0’s and 1’s
- one
- sequence of zero’s and one’s
Q14 | The value of acknowledgement field in a segment defines
- sequence number of the byte received previously
- total number of bytes to receive
- sequence number of the next byte to be received
- sequence of zeros and ones
Q15 | Two broad categories of congestion control are
- open-loop and closed-loop
- open-control and closed-control
- active control and passive control
- active loop and passive loop
Q16 | Retransmission of packets must not be done when
- packet is lost
- packet is corrupted
- packet is needed
- packet is error-free
Q17 | In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. Whereas in Selective Repeat window, the sender resends
- packet which are not lost
- only those packets which are lost or corrupted
- packet from starting
- all the packets
Q18 | Closed-Loop control mechanisms try to
- remove after congestion occurs
- remove after sometime
- prevent before congestion occurs
- prevent before sending packets
Q19 | The technique in which a congested node stops receiving data from the immediate upstream node or nodes is called as
- admission policy
- backpressure
- forward signaling
- backward signaling
Q20 | The packet sent by a node to the source to inform it of congestion is called
- explicit
- discard
- choke
- backpressure
Q21 | In the slow-start algorithm, the size of the congestion window increases until it reaches a threshold.
- exponentially
- additively
- multiplicatively
- suddenly
Q22 | Which is not a application layer protocol?
- http
- smtp
- ftp
- tcp
Q23 | The packet of information at the application layer is called
- packet
- message
- segment
- frame
Q24 | Which one of the following is an architecture paradigms?
- peer to peer
- client-server
- http
- both peer-to-peer & client-server
Q25 | Application layer offers service.
- end to end
- process to process
- both end to end and process to process
- none of the mentioned