Computer Network Multiple Choice Question MCQ
Categories: Software
Ques 1) Which of these is a standard interface for serial data transmission? (a) ASCII (b) RS232C (c) 2 (d) Centronics Answer: (b) RS232C Ques 2) Which type of topology is best suited for large businesses which must carefully control and coordinate the operation of distributed branch outlets? (a) Ring (b) Local area (c) Hierarchical (d) Star Answer: (d) Star Ques 3) Which of the following transmission directions listed is not a legitimate channel? (a) Simplex (b) Half Duplex (c) Full Duplex (d) Double Duplex Answer: (d) Double Duplex Ques 4) "Parity bits" are used for which of the following purposes? (a) Encryption of data (b) To transmit faster (c) To detect errors (d) To identify the user Answer: (c) To detect errors Ques 5) What kind of transmission medium is most appropriate to carry data in a computer network that is exposed to electrical interferences? (a) Unshielded twisted pair (b) Optical fiber (c) Coaxial cable (d) Microwave Answer: (b) Optical fiber Ques 6) A collection of hyperlinked documents on the internet forms the ?.? (a) World Wide Web (WWW) (b) E-mail system (c) Mailing list (d) Hypertext markup language Answer: (a) World Wide Web (WWW) Ques 7) The location of a resource on the internet is given by its? (a) Protocol (b) URL (c) E-mail address (d) ICQ Answer: (b) URL Ques 8) The term HTTP stands for? (a) Hyper terminal tracing program (b) Hypertext tracing protocol (c) Hypertext transfer protocol (d) Hypertext transfer program Answer: (c) Hypertext transfer protocol Ques 9) A proxy server is used as the computer? (a) with external access (b) acting as a backup (c) performing file handling (d) accessing user permissions Answer: (a) with external access Ques 10) Which one of the following would breach the integrity of a system? (a) Looking the room to prevent theft (b) Full access rights for all users (c) Fitting the system with an anti-theft device (d) Protecting the device against willful or accidental damage Answer: (b) Full access rights for all users Ques 11) Which software prevents the external access to a system? (a) Firewall (b) Gateway (c) Router (d) Virus checker Answer: (a) Firewall Ques 12) Which one of the following is a valid email address? (a) javat@point.com (b) gmail.com (c) tpoint@.com (d) javatpoint@books Answer: (a) javat@point.com Ques 13) Which of the following best describes uploading information? (a) Sorting data on a disk drive (b) Sending information to a host computer (c) Receiving information from a host computer (d) Sorting data on a hard drive Answer: (b) Sending information to a host computer Ques 14) Which one of the following is the most common internet protocol? (a) HTML (b) NetBEUI (c) TCP/IP (d) IPX/SPX Answer: (c) TCP/IP Ques 15) Software programs that allow you to legally copy files and give them away at no cost are called which of the following? (a) Probe ware (b) Timeshare (c) Shareware (d) Public domain Answer: (d) Public domain