Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 97 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

51.

The network established using Bluetooth technology is called a .

A. local area network (lan)
B. wide area network (wan)
C. metropolitan area network (man)
D. personal area network (pan)
Answer» E.
52.

Open WiFi networks have .

A. a visible name
B. no password
C. visible name without any password
D. none of them
Answer» E.
53.

Name of a WiFi network may be .

A. visible
B. invisible
C. both a & b
D. none of them
Answer» D. none of them
54.

WiFi networks have for connecting.

A. name
B. password
C. both a & b
D. none of them
Answer» D. none of them
55.

Normally, WiFi signal reach m distance.

A. 50 to 100m
B. 1 to 2m
C. 0.5 to 1.0m
D. 2 to 3m
Answer» B. 1 to 2m
56.

In terms of data safety, wireless networks are wired networks.

A. more secure than
B. less secure than
C. as safe as
D. none of them
Answer» C. as safe as
57.

Wireless networks are wired networks.

A. slower than
B. faster than
C. as fast as
D. none of them
Answer» B. faster than
58.

In the modern days, is the best choice for wireless networking.

A. wifi
B. infrared
C. radio waves
D. micro-wave
Answer» B. infrared
59.

Wireless networks communicate using signal instead of cables.

A. infrared
B. low frequency radio wave
C. wireless fidelity (wifi - ieee 802.11 standard)
D. all of them
Answer» E.
60.

Fibre optic cables are interferences from electric cables and electromagnetic waves.

A. prone to
B. unaffected by
C. susceptible to
D. affected by
Answer» C. susceptible to
61.

The device which connects one Local Area Network to another Local Area Network is called

A. hub
B. switch
C. modem
D. bridge
Answer» E.
62.

A cable with single copper core and braided metal shield is called .

A. unshielded twisted cable
B. shielded twisted cable
C. coaxial cable
D. fibre optic cable
Answer» D. fibre optic cable
63.

Switch is to a hub since unwanted repetitions are curtailed.

A. inferior
B. superior
C. equivalent
D. none of them
Answer» C. equivalent
64.

Hub is to switch/ bridge since it repeats data even to the unwanted connections.

A. inferior
B. superior
C. equivalent
D. none of them
Answer» B. superior
65.

MODEM is a device used for converting .

A. digital signal to analog
B. analog signal to digital
C. both a & b
D. neither a nor b
Answer» D. neither a nor b
66.

MODEM is used to convey data over .

A. air
B. telephone line
C. train track
D. bus route
Answer» C. train track
67.

When network hosts are connected without wires, protocol is used.

A. lan
B. wan
C. man
D. wlan
Answer» E.
68.

Usually, the network connecting hosts located in several cities or nations is called .

A. lan
B. wan
C. man
D. none of them
Answer» C. man
69.

Usually, the network connecting hosts inside a single building is called .

A. lan
B. wan
C. man
D. none of them
Answer» B. wan
70.

When all nodes are connected to a central hub, it is topology.

A. point to point
B. bus
C. star
D. ring
Answer» D. ring
71.

When 2 devices are connected through a dedicated line, it is topology.

A. point to point
B. bus
C. star
D. ring
Answer» B. bus
72.

The design adopted for connecting several hosts on a network is called .

A. telephony
B. wiring
C. connection
D. topology
Answer» E.
73.

Firewall can be implemented through .

A. hardware
B. software
C. both a & b
D. none of them
Answer» D. none of them
74.

Firewall can .

A. deny access to specific sites
B. allow access to only white listed sites
C. both a & b
D. none of them
Answer» D. none of them
75.

A program which runs in the background and sends results requested by a client is called a .

A. server
B. client
C. port
D. ip address
Answer» B. client
76.

Port number on a computer host connected to a network denotes a .

A. background server program
B. client program
C. both a & b
D. none of them
Answer» D. none of them
77.

IP address helps to a computer connected to a network.

A. uniquely identify
B. format
C. reset
D. reject
Answer» B. format
78.

Routers help in .

A. transmission of data between networks
B. connecting different devices using appropriate protocol
C. both a & b
D. neither a nor b
Answer» D. neither a nor b
79.

MODEM stands for .

A. modulation democracy
B. modulation demodulation
C. modern demodulation
D. moderate demodulation
Answer» C. modern demodulation
80.

are the hardware devices that help the computer to connect to a network.

A. routers
B. modems
C. wireless modems
D. all of them
Answer» E.
81.

Wireless network connections use technologies.

A. wireless fidelity (wifi)
B. bluetooth
C. both a & b
D. neither a nor b
Answer» D. neither a nor b
82.

The port for connecting broadband cable to a computer is called .

A. ethernet port
B. registered jack 45 (rj-45)
C. both a & b
D. none of them
Answer» D. none of them
83.

Most of the wired network connections use .

A. optical fibre cable (ofc)
B. usb cable
C. pen drive
D. hard drive
Answer» B. usb cable
84.

Computers and devices can be connected using technology to create a network.

A. wired
B. wireless
C. both a & b
D. neither a nor b
Answer» D. neither a nor b
85.

Internet is constituted of .

A. network of networks
B. hard disk
C. dvd
D. pen drive
Answer» B. hard disk
86.

The address 2001:db8:a0b:12f0::1 is formatted in .

A. ipv0
B. ipv2
C. ipv4
D. ipv6
Answer» E.
87.

Connection to the Internet requires enforcement of security.

A. low
B. high
C. zero
D. no
Answer» C. zero
88.

Filtering connections and disallowing prohibited connections is carried out using .

A. modem
B. router
C. firewall
D. bridge
Answer» D. bridge
89.

Second general firewalls operated at layer of the OSI model.

A. 3
B. 4
C. 5
D. 7
Answer» C. 5
90.

First general firewalls operated at layer of the OSI model.

A. 3
B. 4
C. 5
D. 7
Answer» B. 4
91.

Third general firewalls operated at layer of the OSI model.

A. 3
B. 4
C. 5
D. 7
Answer» E.
92.

First generation firewalls were otherwise called .

A. packet filters
B. stateful filters
C. application filters
D. none of them
Answer» B. stateful filters
93.

Second generation firewalls were otherwise called .

A. packet filters
B. stateful filters
C. application filters
D. none of them
Answer» C. application filters
94.

Third generation firewalls were otherwise called .

A. packet filters
B. stateful filters
C. application filters
D. none of them
Answer» D. none of them
95.

IPS in firewall stands for .

A. intrusion protection system
B. intrusion prevention software
C. internet prevention system
D. intrusion prevention system
Answer» E.
96.

The identity management system binds logical addresses to for reputed servers.

A. mac address
B. specific programs
C. other computers
D. none of them
Answer» B. specific programs
97.

Third generation of firewall offers_ to prevent web fingerprint attacks.

A. web application firewall
B. packet filter
C. stateful filter
D. none of them
Answer» B. packet filter