

MCQOPTIONS
Saved Bookmarks
This section includes 97 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
51. |
The network established using Bluetooth technology is called a . |
A. | local area network (lan) |
B. | wide area network (wan) |
C. | metropolitan area network (man) |
D. | personal area network (pan) |
Answer» E. | |
52. |
Open WiFi networks have . |
A. | a visible name |
B. | no password |
C. | visible name without any password |
D. | none of them |
Answer» E. | |
53. |
Name of a WiFi network may be . |
A. | visible |
B. | invisible |
C. | both a & b |
D. | none of them |
Answer» D. none of them | |
54. |
WiFi networks have for connecting. |
A. | name |
B. | password |
C. | both a & b |
D. | none of them |
Answer» D. none of them | |
55. |
Normally, WiFi signal reach m distance. |
A. | 50 to 100m |
B. | 1 to 2m |
C. | 0.5 to 1.0m |
D. | 2 to 3m |
Answer» B. 1 to 2m | |
56. |
In terms of data safety, wireless networks are wired networks. |
A. | more secure than |
B. | less secure than |
C. | as safe as |
D. | none of them |
Answer» C. as safe as | |
57. |
Wireless networks are wired networks. |
A. | slower than |
B. | faster than |
C. | as fast as |
D. | none of them |
Answer» B. faster than | |
58. |
In the modern days, is the best choice for wireless networking. |
A. | wifi |
B. | infrared |
C. | radio waves |
D. | micro-wave |
Answer» B. infrared | |
59. |
Wireless networks communicate using signal instead of cables. |
A. | infrared |
B. | low frequency radio wave |
C. | wireless fidelity (wifi - ieee 802.11 standard) |
D. | all of them |
Answer» E. | |
60. |
Fibre optic cables are interferences from electric cables and electromagnetic waves. |
A. | prone to |
B. | unaffected by |
C. | susceptible to |
D. | affected by |
Answer» C. susceptible to | |
61. |
The device which connects one Local Area Network to another Local Area Network is called |
A. | hub |
B. | switch |
C. | modem |
D. | bridge |
Answer» E. | |
62. |
A cable with single copper core and braided metal shield is called . |
A. | unshielded twisted cable |
B. | shielded twisted cable |
C. | coaxial cable |
D. | fibre optic cable |
Answer» D. fibre optic cable | |
63. |
Switch is to a hub since unwanted repetitions are curtailed. |
A. | inferior |
B. | superior |
C. | equivalent |
D. | none of them |
Answer» C. equivalent | |
64. |
Hub is to switch/ bridge since it repeats data even to the unwanted connections. |
A. | inferior |
B. | superior |
C. | equivalent |
D. | none of them |
Answer» B. superior | |
65. |
MODEM is a device used for converting . |
A. | digital signal to analog |
B. | analog signal to digital |
C. | both a & b |
D. | neither a nor b |
Answer» D. neither a nor b | |
66. |
MODEM is used to convey data over . |
A. | air |
B. | telephone line |
C. | train track |
D. | bus route |
Answer» C. train track | |
67. |
When network hosts are connected without wires, protocol is used. |
A. | lan |
B. | wan |
C. | man |
D. | wlan |
Answer» E. | |
68. |
Usually, the network connecting hosts located in several cities or nations is called . |
A. | lan |
B. | wan |
C. | man |
D. | none of them |
Answer» C. man | |
69. |
Usually, the network connecting hosts inside a single building is called . |
A. | lan |
B. | wan |
C. | man |
D. | none of them |
Answer» B. wan | |
70. |
When all nodes are connected to a central hub, it is topology. |
A. | point to point |
B. | bus |
C. | star |
D. | ring |
Answer» D. ring | |
71. |
When 2 devices are connected through a dedicated line, it is topology. |
A. | point to point |
B. | bus |
C. | star |
D. | ring |
Answer» B. bus | |
72. |
The design adopted for connecting several hosts on a network is called . |
A. | telephony |
B. | wiring |
C. | connection |
D. | topology |
Answer» E. | |
73. |
Firewall can be implemented through . |
A. | hardware |
B. | software |
C. | both a & b |
D. | none of them |
Answer» D. none of them | |
74. |
Firewall can . |
A. | deny access to specific sites |
B. | allow access to only white listed sites |
C. | both a & b |
D. | none of them |
Answer» D. none of them | |
75. |
A program which runs in the background and sends results requested by a client is called a . |
A. | server |
B. | client |
C. | port |
D. | ip address |
Answer» B. client | |
76. |
Port number on a computer host connected to a network denotes a . |
A. | background server program |
B. | client program |
C. | both a & b |
D. | none of them |
Answer» D. none of them | |
77. |
IP address helps to a computer connected to a network. |
A. | uniquely identify |
B. | format |
C. | reset |
D. | reject |
Answer» B. format | |
78. |
Routers help in . |
A. | transmission of data between networks |
B. | connecting different devices using appropriate protocol |
C. | both a & b |
D. | neither a nor b |
Answer» D. neither a nor b | |
79. |
MODEM stands for . |
A. | modulation democracy |
B. | modulation demodulation |
C. | modern demodulation |
D. | moderate demodulation |
Answer» C. modern demodulation | |
80. |
are the hardware devices that help the computer to connect to a network. |
A. | routers |
B. | modems |
C. | wireless modems |
D. | all of them |
Answer» E. | |
81. |
Wireless network connections use technologies. |
A. | wireless fidelity (wifi) |
B. | bluetooth |
C. | both a & b |
D. | neither a nor b |
Answer» D. neither a nor b | |
82. |
The port for connecting broadband cable to a computer is called . |
A. | ethernet port |
B. | registered jack 45 (rj-45) |
C. | both a & b |
D. | none of them |
Answer» D. none of them | |
83. |
Most of the wired network connections use . |
A. | optical fibre cable (ofc) |
B. | usb cable |
C. | pen drive |
D. | hard drive |
Answer» B. usb cable | |
84. |
Computers and devices can be connected using technology to create a network. |
A. | wired |
B. | wireless |
C. | both a & b |
D. | neither a nor b |
Answer» D. neither a nor b | |
85. |
Internet is constituted of . |
A. | network of networks |
B. | hard disk |
C. | dvd |
D. | pen drive |
Answer» B. hard disk | |
86. |
The address 2001:db8:a0b:12f0::1 is formatted in . |
A. | ipv0 |
B. | ipv2 |
C. | ipv4 |
D. | ipv6 |
Answer» E. | |
87. |
Connection to the Internet requires enforcement of security. |
A. | low |
B. | high |
C. | zero |
D. | no |
Answer» C. zero | |
88. |
Filtering connections and disallowing prohibited connections is carried out using . |
A. | modem |
B. | router |
C. | firewall |
D. | bridge |
Answer» D. bridge | |
89. |
Second general firewalls operated at layer of the OSI model. |
A. | 3 |
B. | 4 |
C. | 5 |
D. | 7 |
Answer» C. 5 | |
90. |
First general firewalls operated at layer of the OSI model. |
A. | 3 |
B. | 4 |
C. | 5 |
D. | 7 |
Answer» B. 4 | |
91. |
Third general firewalls operated at layer of the OSI model. |
A. | 3 |
B. | 4 |
C. | 5 |
D. | 7 |
Answer» E. | |
92. |
First generation firewalls were otherwise called . |
A. | packet filters |
B. | stateful filters |
C. | application filters |
D. | none of them |
Answer» B. stateful filters | |
93. |
Second generation firewalls were otherwise called . |
A. | packet filters |
B. | stateful filters |
C. | application filters |
D. | none of them |
Answer» C. application filters | |
94. |
Third generation firewalls were otherwise called . |
A. | packet filters |
B. | stateful filters |
C. | application filters |
D. | none of them |
Answer» D. none of them | |
95. |
IPS in firewall stands for . |
A. | intrusion protection system |
B. | intrusion prevention software |
C. | internet prevention system |
D. | intrusion prevention system |
Answer» E. | |
96. |
The identity management system binds logical addresses to for reputed servers. |
A. | mac address |
B. | specific programs |
C. | other computers |
D. | none of them |
Answer» B. specific programs | |
97. |
Third generation of firewall offers_ to prevent web fingerprint attacks. |
A. | web application firewall |
B. | packet filter |
C. | stateful filter |
D. | none of them |
Answer» B. packet filter | |