πŸ“Š Computer Architecture and Organization
Q. Which of the following computer networks is built on the top of another network?
  • (A) prior network
  • (B) chief network
  • (C) prime network
  • (D) overlay network
πŸ’¬ Discuss
βœ… Correct Answer: (D) overlay network

Explanation: an overlay network is a computer network that is built on top of another network. some examples of an overlay network are virtual private networks (vpn) and peer-to-peer networks (p2p).

πŸ“Š Computer Architecture and Organization
Q. A is a device that forwards packets between networks by processing the routing information included in the packet.
  • (A) bridge
  • (B) firewall
  • (C) router
  • (D) hub
πŸ’¬ Discuss
βœ… Correct Answer: (C) router

Explanation: a router is a networking device that forwards data packets between computer networks. routers perform the traffic directing functions on the internet. they make use of routing protocols like rip to find the cheapest path to the destination.

πŸ“Š Computer Architecture and Organization
Q. Which of the following networks extends a private network across public networks?
  • (A) local area network
  • (B) virtual private network
  • (C) enterprise private network
  • (D) storage area network
πŸ’¬ Discuss
βœ… Correct Answer: (B) virtual private network

Explanation: a virtual private network extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.vpn provides enhanced security and online anonymity to users on the internet. it is also used to unblock websites which are unavailable in certain regions.

πŸ“Š Computer Architecture and Organization
Q. Which network topology requires a central controller or hub?
  • (A) star
  • (B) mesh
  • (C) ring
  • (D) bus
πŸ’¬ Discuss
βœ… Correct Answer: (A) star

Explanation: in star topology, no computer is connected to another computer directly but all the computers are connected to a central hub. every message sent from a source computer goes through the hub and the hub then forwards the message only to the intended destination computer.

πŸ“Š Computer Architecture and Organization
Q. topology requires a multipoint connection.
  • (A) star
  • (B) mesh
  • (C) ring
  • (D) bus
πŸ’¬ Discuss
βœ… Correct Answer: (D) bus

Explanation: in bus topology, there is a single cable to which all the network nodes are connected. so whenever a node tries to

πŸ“Š Computer Architecture and Organization
Q. WAN stands for
  • (A) world area network
  • (B) wide area network
  • (C) web area network
  • (D) web access network
πŸ’¬ Discuss
βœ… Correct Answer: (B) wide area network

Explanation: wan is the abbreviation for wide area network. this network extends

πŸ“Š Computer Architecture and Organization
Q. is the multiplexing technique that shifts each signal to a different carrier frequency.
  • (A) fdm
  • (B) tdm
  • (C) both fdm & tdm
  • (D) pdm
πŸ’¬ Discuss
βœ… Correct Answer: (A) fdm

Explanation: fdm is an abbreviation for frequency division multiplexing. this technique is used when the bandwidth of the channel is greater than the combined bandwidth of all the signals which are to be transmitted. the channel is active at all times unless a collision occurs with another channel trying to use the same frequency. some other multiplexing techniques are time division multiplexing and phase division multiplexing.

πŸ“Š Computer Architecture and Organization
Q. 3 OVERVIEW OF INTERNET
  • (A) internet exchange point
  • (B) subscriber end point
  • (C) isp end point
  • (D) internet end point
πŸ’¬ Discuss
βœ… Correct Answer: (A) internet exchange point

Explanation: isps exchange internet traffic between their networks by using internet exchange points. isps and cdns are connected to each other at these physical locations are they help them provide better service to their customers.

πŸ“Š Computer Architecture and Organization
Q. Which of the following protocols is used in the internet?
  • (A) http
  • (B) dhcp
  • (C) dns
  • (D) dns, http and dns
πŸ’¬ Discuss
βœ… Correct Answer: (D) dns, http and dns

Explanation: http is used to browse all the websites on the world wide web, dhcp is used to allot ips automatically to the users on the internet, and dns is used to connect the users to the host servers on the internet based on the domain name.

πŸ“Š Computer Architecture and Organization
Q. Which of the following is an example of physical layer vulnerability?
  • (A) mac address spoofing
  • (B) physical theft of data
  • (C) route spoofing
  • (D) weak or non-existent authentication
πŸ’¬ Discuss
βœ… Correct Answer: (B) physical theft of data

Explanation: physical theft of data is an example of physical layer vulnerability. other such issues are unauthorized network access, damage or destruction of data & hardware and keystroke & other input logging.

Jump to