Q: 1 A is a supplementary protocol that allows non-ASCII data to be sent through e-mail.
SMTP (Simple Mail Transfer Protocol)
Multipurpose Internet Mail Extensions (MIME)
IMAP (Internet Mail Access Protocol)
POP (Post Office Protocol)
[ Option B ]
Emails were originally designed to send only ASCII (American Standard Code for Information Interchange) text, meaning simple English letters, digits, and symbols. But over time, people needed to send images, audio, video, documents, and text in other languages (Non-ASCII).
To solve this, an additional standard was developed called MIME (Multipurpose Internet Mail Extensions). It works with existing email protocols like SMTP, POP, or IMAP and allows emails to carry different types of content.
Besides supporting non-ASCII text, MIME also allows multiple parts in a single email, enabling attachments and formatted text. When we attach a photo or a PDF in an email, MIME encodes that file into a format (like Base64) that can be sent as plain text through SMTP. The receiver’s email client then decodes it back to the original file.
Q: 2 Which of the following is not true about IMAP4 protocol?
A user can check the e-mail header prior to downloading.
A user can search the contents of the e-mail for a specific string of characters prior to downloading.
A user can create, delete, or rename mailboxes on the mail server.
A user cannot create a hierarchy of mailboxes in a folder for e-mail storage.
[ Option D ]
When we use email, different protocols handle the sending and receiving of messages. SMTP (Simple Mail Transfer Protocol) is used for sending emails from one server to another, while POP (Post Office Protocol) is designed to download emails from the server to a single device, usually removing them from the server afterward.
In contrast, IMAP (Internet Message Access Protocol) allows users to access, manage, and organize their emails directly on the mail server, keeping messages synchronized across multiple devices such as phones, laptops, and tablets.
| FEATURE | DESCRIPTION |
|---|---|
| View headers before download | You can preview sender, subject, and date without downloading the full email. |
| Search emails on server | You can search for specific words or phrases in emails directly on the mail server. |
| Create/manage mailboxes | You can create, delete, or rename mail folders. |
| Organize in hierarchy | IMAP allows a hierarchy (folder and subfolder system) for better organization. |
Q: 3 A Reverse Lookup in DNS means a lookup to _________ using _________ records.
map domain names to IP address, A
map IP address to domain name, PTR
determine the authoritative name servers, CNAME
identify mail servers, SOA
[ Option B ]
The Domain Name System (DNS) is like the phonebook of the internet. It helps us convert easy-to-remember domain names into numerical IP addresses that computers use to communicate. DNS makes browsing the internet simple and user-friendly.
There are two types of DNS lookups:
Forward Lookup: This converts a domain name to an IP address using A or AAAA records.
Reverse Lookup: This converts an IP address back to a domain name using a PTR (Pointer) record. It helps in verification, logging, and network troubleshooting.
Q: 4 The Address Resolution Protocol (ARP) is used for –
Finding the IP address from the DNS.
Finding the IP address that corresponds to a MAC address.
Finding the IP address of the default gateway.
Finding the MAC address that corresponds to an IP address.
[ Option D ]
The Address Resolution Protocol (ARP) is used for finding the MAC address that corresponds to a given IP address within a Local Network.
When a device wants to communicate with another device on the same network, it needs the MAC address (Physical Address) of the destination device to actually send the data.
ARP helps in this process by broadcasting a request with the target IP address to all devices on the network. Only the device with the matching IP responds with its MAC address, enabling the sender to Map the IP Address to the correct MAC Address.
Q: 5 Which of the following statements is TRUE about the High-Level Data-Link Control (HDLC) protocol?
HDLC is a character-oriented protocol used on asynchronous links.
HDLC provides authentication mechanisms for secure communication.
HDLC is a point-to-point, bit-oriented protocol standardized by ISO.
HDLC is used exclusively for wireless communication between wireless nodes.
[ Option C ]
HDLC (High-Level Data Link Control) is a Layer-2 (Data Link Layer), bit-oriented (it treats the transmitted data as a stream of bits) protocol formalized by ISO. It supports reliable framing, Error Detection (CRC) for reliable communication and operates commonly in point-to-point links (Router-to-Router).
| PROTOCOL | TYPE | MEDIUM | ORIENTATION |
|---|---|---|---|
| HDLC | Data Link | Point-to-point / multipoint | Bit-Oriented. |
| BISYNC (Binary Synchronous Communication) | Data Link | Synchronous | Character-Oriented. |
| PPP (Point-to-Point Protocol) | Data Link | Point-to-point | Byte-Oriented. |
Q: 6 Which of the following protocol is used for transferring email messages from one machine to another?
SNMP
TELNET
SMTP
FTP
[ Option C ]
SMTP (Simple Mail Transfer Protocol) is used to send email from one computer (Mail Server) to another over the internet. Whenever you send an email, SMTP is responsible for transferring your message from the sender’s server to the receiver’s server.
The SMTP operates over TCP, commonly on port 25, ensuring reliable delivery of messages across networks.
Q: 7 Which of the following pairs is not correctly matched?
TELNET-logon to a remote machine
MIME-transfer multimedia messages
SMTP-Email Services
NVT-Name Server
[ Option D ]
In Internet communication, different protocols and standards are used for specific purposes.
| TERM | DESCRIPTION |
|---|---|
| TELNET – logon to a remote machine | TELNET (TELecommunication NETwork) is a protocol used to remotely log in to another computer and execute commands as if you were directly connected to it. |
| MIME – transfer multimedia messages | MIME (Multipurpose Internet Mail Extensions) allows sending non-ASCII data such as images, audio, and video through email. It extends the basic email format. |
| SMTP – Email services | SMTP (Simple Mail Transfer Protocol) is the main protocol used for sending emails from client to server or between mail servers. |
| NVT – Name Server | NVT (Network Virtual Terminal) is not a name server. It is a standard interface used in TELNET that allows different computer systems to communicate in a common text format. The protocol related to name servers is DNS (Domain Name System), not NVT. |
Q: 8 What is the meaning of status code 400 in HTTP?
Accepted
Moved Permanently
Not Found
Bad Request
[ Option D ]
When a client (web browser) sends a request to a web server using the HTTP (Hypertext Transfer Protocol), the server responds with a status code. These codes tell whether the request was successful, redirected, failed, or caused an error. HTTP status codes are divided into five main categories:
| CATEGORY | CODE RANGE | MEANING |
|---|---|---|
| 1xx | 100–199 | Informational, request received and continuing process. |
| 2xx | 200–299 | Success ,the request was successfully received and processed. Example: 200 OK means everything worked fine, 201 Created means a new resource was successfully created. |
| 3xx | 300–399 | Redirection, further action needs to be taken. Example: 301 Moved Permanently or 302 Found indicate that the resource has a new location. |
| 4xx | 400–499 | Client Error, the request has bad syntax or cannot be fulfilled. Example: 400 Bad Request, 401 Unauthorized, or 404 Not Found. |
| 5xx | 500–599 | Server Error, the server failed to fulfill a valid request. Example: 500 Internal Server Error, 502 Bad Gateway, or 503 Service Unavailable. |
Status code 400 in the HTTP protocol means "Bad Request". This error occurs when the server cannot process a request because the client has sent data that is invalid, malformed, or cannot be understood.
Q: 9 What is the role of DNS? It is best described as –
Translate a host's IPv6 address to an IPv4 address
Maps a MAC address to an IP address
Translate a host's private IP address to a public IP address
Maps a domain name to an IP address
[ Option D ]
DNS (Domain Name System) works like the “PHONEBOOK OF THE INTERNET”. It takes a human-readable domain name like www.surakuacademy.com and finds the corresponding numerical IP address (like 46.28.45.103) so that computers can locate and connect to the correct server. Without DNS, users would have to remember and type IP addresses instead of easy names.
What DNS Does:
Q: 10 Network Allocation Vector (NAV) is associated with which of the following MAC technologies?
CSMA/CD
Bluetooth
Wi-Fi
Ethernet
[ Option C ]
NAV (Network Allocation Vector) is a virtual carrier sensing mechanism used in Wi-Fi (IEEE 802.11) networks as part of the CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) protocol.
It acts as a timer that indicates how long the wireless medium will be busy based on the duration information contained in MAC frame headers.
Q: 11
Given a 5-bit sequence number field (i.e., sequence numbers range from 0 to 31), match each ARQ protocol with its maximum permissible (Sender Window, Receiver Window) to avoid ambiguity in frame recognition.
| Column – A (Protocol) | Column – B (Window Size) |
|---|---|
| a. Stop-and-Wait ARQ | i. (31, 1) |
| b. Go-Back-N-ARQ | ii. (16, 16) |
| c. Selective Repeat ARQ | iii. (1, 1) |
| iv. (18, 18) | |
| v. (32, 1) |
a – iii, b – v, c – iv
a – iii, b – i, c – ii
a – ii, b – i, c – iii
a – iv, b – ii, c – i
[ Option B ]
In Automatic Repeat reQuest (ARQ) protocols, sequence numbers are used to keep track of frames sent and received, ensuring that lost or out-of-order frames can be identified and retransmitted correctly. Each ARQ protocol imposes limits on the sender and receiver window sizes to avoid ambiguity caused by sequence number.
Stop-and-Wait ARQ is the simplest protocol. In this method, the sender transmits only one frame at a time and waits for an acknowledgment before sending the next frame. Consequently, both the sender and receiver windows are limited to 1, resulting in a window pair of (1, 1).
Go-Back-N ARQ allows the sender to transmit multiple frames before receiving acknowledgments. To prevent confusion when sequence numbers wrap around, the sender’s window size must be 2ⁿ – 1, where n is the number of bits in the sequence field. For a 5-bit sequence number, this gives a sender window of 31, while the receiver window remains 1, producing the window pair (31, 1).
Selective Repeat ARQ allows both sender and receiver to maintain windows that support individual acknowledgment and retransmission of frames. To avoid ambiguity, both sender and receiver windows must be limited to 2ⁿ⁻¹. With a 5-bit sequence number, this results in 16 for both sender and receiver windows, giving the pair (16, 16).
| Protocol Used | Sender Window | Receiver Window | Window Pair |
|---|---|---|---|
| Stop-and-Wait ARQ | 1 | 1 | (1, 1) |
| Go-Back-N ARQ | 31 | 1 | (31, 1) |
| Selective Repeat ARQ | 16 | 16 | (16, 16) |
Q: 12
Match the following URL Schemes with their uses:
| URL Scheme Name | Used For |
|---|---|
| a. mailto | i. Streaming media |
| b. rtsp | ii. Browser information |
| c. https | iii. Sending email |
| d. about | iv. Hypertext with security |
a – i, b – iii, c – iv, d – ii
a – iii, b – i, c – iv, d – ii
a – ii, b – i, c – iv , d – iii
a – iii, b – ii, c – iv, d – i
[ Option B ]
Each URL starts with a scheme name (like http, https, mailto, ftp, etc.), which defines the protocol or method used to handle the request. Different schemes are used for different purposes, such as opening a web page, sending an email, or streaming a video.
| URL SCHEME | USED FOR | DESCRIPTION |
|---|---|---|
| mailto | Sending email | This scheme is used to create a link that opens the default email client. Example: mailto:info@surakuacademy.com opens your email app with the address filled in. |
| rtsp | Streaming media | RTSP (Real Time Streaming Protocol) is used to stream audio or video over the Internet in real time. Example: rtsp://media.example.com/movie |
| https | Hypertext with security | HTTPS (Hypertext Transfer Protocol Secure) is a secure version of HTTP that uses encryption (SSL/TLS) for safe data transfer. Example: https://www.surakuacademy.com |
| about | Browser information | The about: scheme is used internally by browsers to show built-in pages like about:blank, about:settings, etc. |
Thank you so much for taking the time to read my Computer Science MCQs section carefully. Your support and interest mean a lot, and I truly appreciate you being part of this journey. Stay connected for more insights and updates! If you'd like to explore more tutorials and insights, check out my YouTube channel.
Don’t forget to subscribe and stay connected for future updates.