Home / Engineering / Computer Architecture and Organization MCQs / Page 1

Computer Architecture and Organization MCQs | Page - 1

Dear candidates you will find MCQ questions of Computer Architecture and Organization here. Learn these questions and prepare yourself for coming examinations and interviews. You can check the right answer of any question by clicking on any option or by clicking view answer button.

M

Mr. Dubey • 51.17K Points
Coach

Q. 1) Which of the following computer networks is built on the top of another network?

(A) prior network
(B) chief network
(C) prime network
(D) overlay network
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 2) A                      is a device that forwards packets between networks by processing the routing information included in the packet.

(A) bridge
(B) firewall
(C) router
(D) hub
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 3) Which of the following networks extends a private network across public networks?

(A) local area network
(B) virtual private network
(C) enterprise private network
(D) storage area network
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 4) Which network topology requires a central controller or hub?

(A) star
(B) mesh
(C) ring
(D) bus
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 5)                topology requires a multipoint connection.

(A) star
(B) mesh
(C) ring
(D) bus
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 6) WAN stands for                      

(A) world area network
(B) wide area network
(C) web area network
(D) web access network
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 7)            is the multiplexing technique that shifts each signal to a different carrier frequency.

(A) fdm
(B) tdm
(C) both fdm & tdm
(D) pdm
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 8) 3 OVERVIEW OF INTERNET

(A) internet exchange point
(B) subscriber end point
(C) isp end point
(D) internet end point
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 9) Which of the following protocols is used in the internet?

(A) http
(B) dhcp
(C) dns
(D) dns, http and dns
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 10) Which of the following is an example of physical layer vulnerability?

(A) mac address spoofing
(B) physical theft of data
(C) route spoofing
(D) weak or non-existent authentication
View Answer Discuss Share