Home / Engineering / Computer Architecture and Organization MCQs / Page 1

Computer Architecture and Organization MCQs | Page - 1

Dear candidates you will find MCQ questions of Computer Architecture and Organization here. Learn these questions and prepare yourself for coming examinations and interviews. You can check the right answer of any question by clicking on any option or by clicking view answer button.

Q. 1) Which of the following computer networks is built on the top of another network?

(A) prior network
(B) chief network
(C) prime network
(D) overlay network
View Answer Discuss Share

Q. 2) A                      is a device that forwards packets between networks by processing the routing information included in the packet.

(A) bridge
(B) firewall
(C) router
(D) hub
View Answer Discuss Share

Q. 3) Which of the following networks extends a private network across public networks?

(A) local area network
(B) virtual private network
(C) enterprise private network
(D) storage area network
View Answer Discuss Share

Q. 4) Which network topology requires a central controller or hub?

(A) star
(B) mesh
(C) ring
(D) bus
View Answer Discuss Share

Q. 5)                topology requires a multipoint connection.

(A) star
(B) mesh
(C) ring
(D) bus
View Answer Discuss Share

Q. 6) WAN stands for                      

(A) world area network
(B) wide area network
(C) web area network
(D) web access network
View Answer Discuss Share

Q. 7)            is the multiplexing technique that shifts each signal to a different carrier frequency.

(A) fdm
(B) tdm
(C) both fdm & tdm
(D) pdm
View Answer Discuss Share

Q. 8) 3 OVERVIEW OF INTERNET

(A) internet exchange point
(B) subscriber end point
(C) isp end point
(D) internet end point
View Answer Discuss Share

Q. 9) Which of the following protocols is used in the internet?

(A) http
(B) dhcp
(C) dns
(D) dns, http and dns
View Answer Discuss Share

Q. 10) Which of the following is an example of physical layer vulnerability?

(A) mac address spoofing
(B) physical theft of data
(C) route spoofing
(D) weak or non-existent authentication
View Answer Discuss Share