Computer Network MCQ( multiple choice questions)| 30 Important Network Multiple Choice Questions with Answers
Computer Network MCQs: In this section, we have to shared computer network mcq questions and answers/ computer network multiple choice questions /Computer network mcq pdf link are given below. Regularly practice these kind of computer network mcq online quiz it will definitely improve your knowledge, skills, reading ability etc. Learning computer network concept is essential even if your are just trying to get better at your current job. Practice in MCQ questions on computer network may improve your performance in the Exams and Interview. Time Management for answering the computer network objective questions and answers/ solved multiple choice questions and answers on networking quickly is most important for success in Placement/ Interviews. People also check this Business Communication MCQ questions and answer. Note the repeated questions and must revise the questions daily
Important Links
SPM MCQ Questions and Answer |
Business Intelligence MCQ Questions |
Ecology and Ecosystem MCQ Questions PDF |
Computer Network MCQs Quiz- Highlights
Article Name | Computer Network |
Number of Questions | 30 |
Category | MCQ |
Read the Given below Computer Network MCQ Question & Answer / Computer Network pdf
1. A proxy server is used as the computer?
A. acting as a backup
B. performing file handling
C. with external access
D. accessing user permissions
Answer: with external access
2. The term HTTP stands for?
A. Hypertext transfer program
B. Hypertext tracing protocol
C. Hyper terminal tracing program
D. Hypertext transfer protocol
Answer: Hypertext transfer protocol
3. The location of a resource on the internet is given by its?
A. Protocol
B. uniform resource locator (URL)
C. ICQ
D. E-mail address
Answer: uniform resource locator (URL)
4. Which one of the following would breach the integrity of a system?
A. Looking the room to prevent theft
B. Full access rights for all users
C. Protecting the device against
D. Fitting the system with an anti-theft device
Answer: Full access rights for all users
5. Which type of topology is best suited for large businesses which must carefully control and coordinate the operation of distributed branch outlets?
A. Star
B. Local area
C. Hierarchical
D. Ring
Answer: Star
6. Which software prevents the external access to a system?
A. firewall
B. Virus checker
C. Gateway
D. Router
Answer: firewall
7. Which of the following transmission directions listed is not a legitimate channel?
A. Half Duplex
B. Double Duplex
C. Simplex
D. Full Duplex
Answer: Double Duplex
8. Which of these is a standard interface for serial data transmission?
A. ASCII
B. 2
C. RS232C
D. Centronics
Answer: RS232C
9. “Parity bits” are used for which of the following purposes?
A. To identify the user
B. Encryption of data
C. error detection
D. To transmit faster
Answer: error detection
10. A collection of hyperlinked documents on the internet forms is ?
A. World Wide Web
B. E-mail system
C. Mailing list
D. Hypertext markup language
Answer: World Wide Web (WWW).
11. What kind of transmission medium is most appropriate to carry data in a computer network that is exposed to electrical interferences?
A. Unshielded twisted pair
B. Coaxial cable
C. Microwave
D. Optical fiber
Answer: Optical fiber
12. When the mail server sends mail to other mail servers it becomes ___ ?
A. Master
B. Peer
C. SMTP server
D. SMTP client
Answer: SMTP client
13. The length of an IPv6 address is?
A. 64 bits
B. 32 bits
C. 128 bits
D. 256 bits
Answer: 128 bits
14. Which of the following is correct IPv4 address?
A. 01.200.128.123
B. 300.142.210.64
C. 128.64.0.0
D. 124.201.3.1.52
Answer: 128.64.0.0
15. How many versions available of IP?
A. 2 version
B. 6 version
C. 4 version
D. 1 version
Answer: 2 version
16. The private key in asymmetric key cryptography is kept by?
A. Transmission
B. Receiver
C. Sender
D. Sender and Receiver
Answer: Receiver
17. Which layer of the TCP / IP stack corresponds to the OSI model transport layer?
A. Application
B. Host to Host
C. Network Access
D. Internet
Answer: Host to Host
18. The term IPv4 stands for?
A. International Programming Version 4
B. Internet Programming Version 4
C. Internet Protocol Version 4
D. None
Answer: Internet Protocol Version 4
19. How many digits of the Data Network Identification Code (DNIC) identify the country?
A. first four
B. first five
C. first three
D. first six
Answer: first three
20. Which of the through is share the data of two computer?
A. Integrated system
B. Library
C. Network
D. Grouping
Answer: Network
21. The term IANA stands for?
A. Internal Assigned Numbers Authority
B. Internet Associative Numbers Authoritative
C. Internet Assigned Numbers Authority
D. Internal Associative Numbers Authority
Answer: Internet Assigned Numbers Authority
22. The term WAN stands for?
A. Wide Area Net
B. Wide Area Network
C. Wide Access Network
D. Wide Access Net
Answer: Wide Area Network
23. Software programs that allow you to legally copy files and give them away at no cost are called which of the following?
A. Probe ware
B. Shareware
C. Timeshare
D. Public domain
Answer: Public domain
24. Which of the following statements could be valid with respect to the ICMP (Internet Control Message Protocol)?
A. It reports all errors which occur during transmission.
B. It informs routers when an incorrect path has been taken.
C. A redirect message is used when a router notices that a packet seems to have been routed wrongly
D. The “destination unreachable” type message is used when a router cannot locate the destination.
Answer: A redirect message is used when a router notices that a packet seems to have been routed wrongly
25. The IP network 192.168.50.0 is to be divided into 10 equal sized subnets. Which of the following subnet masks can be used for the above requirement?
A. 255.255.255.0
B. 255.243.240
C. 255.255.255
D. 255.255.0
Answer: 255.255.255.0
26. The term FTP stands for?
A. File transfer protocol
B. File transfer program
C. File transfer protection
D. File transmission protocol
Answer: File transfer protocol
27. Which one of the following is not a network topology?
A. Star
B. Ring
C. Bus
D. Peer to Peer
Answer: Peer to Peer
28. The maximum length (in bytes) of an IPv4 datagram is?
A. 32
B. 65535
C. 1024
D. 516
Answer: 65535
29. Which one of the following is the most common internet protocol?
A. HTML
B. TCP/IP
C. IPX/SPX
D. NetBEUI
Answer: TCP/IP
30. Which of the following best describes uploading information?
A. Receiving information from a host computer
B. Sorting data on a disk drive
C. Sending information to a host computer
D. Sorting data on a hard drive
Answer: Sending information to a host computer
Get in touch with our dailyrecruitment site regularly to get more gk updates, state/central government jobs/private jobs, syllabus, previous questions paper etc. Candidates click the below link to download the computer network mcq. To know the business and commerce mcq questions visit the dailyrecruitment site.
Govt Jobs by Qualifications
Education & Vacancies | Salary | Apply Link |
---|---|---|
12th Pass Govt Jobs - 18,000+ Vacancies | Rs. 5,200 - 92,300 | Apply Now |
ITI Pass Jobs - 3,500 Vacancies | Rs. 5,200 - 35,000 | Apply Now |
Any Graduate Jobs - 19,100 Vacancies | Rs. 5,200 - 92,300 | Apply Now |
Central Govt Jobs | Rs. 5,200 - 17,000 | Apply Now |
Bank Jobs - 1,000 Vacancies | Rs. 5,200 - 29,200 | Apply Now |
Diploma Jobs - 9,300 Vacancies | Rs. 5,200 - 35,000 | Apply Now |
BTech/BE Jobs - 18,000 Vacancies | Rs. 15,000 - 1,00,000 | Apply Now |
Data Entry Jobs - 1,300 Vacancies | Rs. 5,200 - 29,200 | Apply Now |
Private Jobs | Rs. 10,000 - 67,700 | Apply Now |