Home Programming Kids Programming Hardware & Software Hardware & Networking APP security Software Education Kids Study MCQS Download OTHERS Login

Computer Network Multiple Choice Question MCQ

Categories: Software

Ques 1) Which of these is a standard interface for serial data transmission?


(a) ASCII

(b) RS232C

(c) 2

(d) Centronics

Answer: (b) RS232C


Ques 2) Which type of topology is best suited for large businesses which must carefully control and coordinate the operation of distributed branch outlets?


(a) Ring

(b) Local area

(c) Hierarchical

(d) Star

Answer: (d) Star


Ques 3) Which of the following transmission directions listed is not a legitimate channel?


(a) Simplex

(b) Half Duplex

(c) Full Duplex

(d) Double Duplex

Answer: (d) Double Duplex


Ques 4) "Parity bits" are used for which of the following purposes?

(a) Encryption of data

(b) To transmit faster

(c) To detect errors

(d) To identify the user

Answer: (c) To detect errors


Ques 5) What kind of transmission medium is most appropriate to carry data in a computer network that is exposed to electrical interferences?


(a) Unshielded twisted pair

(b) Optical fiber

(c) Coaxial cable

(d) Microwave

Answer: (b) Optical fiber


Ques 6) A collection of hyperlinked documents on the internet forms the ?.?


(a) World Wide Web (WWW)

(b) E-mail system

(c) Mailing list

(d) Hypertext markup language

Answer: (a) World Wide Web (WWW)


Ques 7) The location of a resource on the internet is given by its?


(a) Protocol

(b) URL

(c) E-mail address

(d) ICQ

Answer: (b) URL


Ques 8) The term HTTP stands for?


(a) Hyper terminal tracing program

(b) Hypertext tracing protocol

(c) Hypertext transfer protocol

(d) Hypertext transfer program

Answer: (c) Hypertext transfer protocol


Ques 9) A proxy server is used as the computer?


(a) with external access

(b) acting as a backup

(c) performing file handling

(d) accessing user permissions

Answer: (a) with external access


Ques 10) Which one of the following would breach the integrity of a system?

(a) Looking the room to prevent theft

(b) Full access rights for all users

(c) Fitting the system with an anti-theft device

(d) Protecting the device against willful or accidental damage

Answer: (b) Full access rights for all users


Ques 11) Which software prevents the external access to a system?


(a) Firewall

(b) Gateway

(c) Router

(d) Virus checker

Answer: (a) Firewall


Ques 12) Which one of the following is a valid email address?


(a) javat@point.com

(b) gmail.com

(c) tpoint@.com

(d) javatpoint@books

Answer: (a) javat@point.com


Ques 13) Which of the following best describes uploading information?


(a) Sorting data on a disk drive

(b) Sending information to a host computer

(c) Receiving information from a host computer

(d) Sorting data on a hard drive

Answer: (b) Sending information to a host computer


Ques 14) Which one of the following is the most common internet protocol?


(a) HTML

(b) NetBEUI

(c) TCP/IP

(d) IPX/SPX

Answer: (c) TCP/IP


Ques 15) Software programs that allow you to legally copy files and give them away at no cost are called which of the following?


(a) Probe ware

(b) Timeshare

(c) Shareware

(d) Public domain

Answer: (d) Public domain

Top articles
5 Best Mobile Backup Software (2022) Published at:- 5 Best Assistance Work area Programming in 2022 Published at:- Amazon Redshift Versus Purplish Blue Neural Connection: Which Is the Victor? Published at:- Compare 6 Top Android to iPhone Transfer Apps Published at:- Best Free Software for Graphic Design Published at:- Advantages and Disadvantages of various Software Development Published at:- The Benefits of Using the 24-Hour Fitness App for Your Fitness Journey Published at:- What Are the Trending Software Development Skills Published at:- How to Download YouTube Videos Without Any Software Published at:- The Top Software Development Courses for Aspiring Programmers Published at:- Why Your Business Needs a CRM Software Solution Published at:- GanttPRO: Streamlining Project Management for Optimal Success Published at:- Software Outsourcing: Advantages, Challenges, and Best Practices Published at:- The Rise of Free Video Call Services: Connecting the World Online Published at:- The Evolution of Communication: Embracing Free Video Call Websites Published at:- The Power of Online Chat and Free Video Calls: Connecting the World Like Never Before Published at:- The Ultimate Guide to Choosing the best Video Editing Software Published at:- Is Getintopc a Safe Source for Software? Exploring Software Categories and Safety Considerations Published at:- Navigating the Innovations: The Latest Android Operating System Published at:- Unveiling the Future: Exploring the New Version of Android Operating System Published at:- What's New with Google Maps iPhone Live Activities in 2024? Published at:- How Apple's New AI Chip Is Redefining Smart Technology in 2024 Published at:- How Technology is Changing the Future of Uber Drivers in 2024 Published at:- Unleashing the Power: Top AI Tools Every Business Needs Published at:- Comedy Showdown: Can AI Really Outwit Humans in Humor? Published at:- Computer Network Multiple Choice Question MCQ Published at:-

Computer Network Multiple Choice Question MCQ