Top 250+ Solved Computer Architecture and Organization MCQ Questions Answer
Q. The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called
a. piggybacking
b. cyclic redundancy check
c. fletcher’s checksum
d. parity check
Q. Automatic repeat request error management mechanism is provided by
a. logical link control sublayer
b. media access control sublayer
c. network interface control sublayer
d. application access control sublayer
Q. In layering, n layers provide service to
a. n layer
b. n-1 layer
c. n+1 layer
d. none of the mentioned
Q. Which can be used as an intermediate device in between transmitter entity and receiver entity?
a. ip router
b. microwave router
c. telephone switch
d. all of the mentioned
Q. Which has comparatively high frequency component?
a. sine wave
b. cosine wave
c. square wave
d. none of the mentioned
Q. Which has continuous transmission?
a. asynchronous
b. synchronous
c. asynchronous & synchronous
d. none of the mentioned
Q. Which requires bit transitions?
a. asynchronous
b. synchronous
c. asynchronous & synchronous
d. none of the mentioned
Q. In synchronous transmission, receiver must stay synchronous for
a. 4 bits
b. 8 bits
c. 9 bits
d. 16 bits
Q. How error detection and correction is done?
a. by passing it through equalizer
b. by passing it through filter
c. by amplifying it
d. by adding redundancy bits
Q. Which is more efficient?
a. parity check
b. cyclic redundancy check
c. parity & cyclic redundancy check
d. none of the mentioned
Q. Which can detect two bit errors?
a. parity check
b. cyclic redundancy check
c. parity & cyclic redundancy check
d. none of the mentioned
Q. CRC uses
a. multiplication
b. binary division
c. multiplication & binary division
d. none of the mentioned
Q. What is start frame delimeter (SFD) in ethernet frame?
a. 10101010
b. 10101011
c. 00000000
d. 11111111
Q. What is autonegotiation?
a. a procedure by which two connected devices choose common transmission parameters
b. a security algorithm
c. a routing algorithm
d. encryption algorithm