Computer Networks MCQs

Computer Networks MCQs

Our experts have gathered these Computer Networks MCQs through research, and we hope that you will be able to see how much knowledge base you have for the subject of Computer Networks by answering these multiple-choice questions.
Get started now by scrolling down!

1: How much faster is 5G technology than its predecessors?

A.   5 times

B.   20 times

C.   15 times

D.   10 times

2: What does Network slicing do?

A.   Focuses on private networks

B.   Makes efficient use of carriers' wireless capacity

C.   Is a virtual network infrastructure

D.   Enables smart cities

3: What is Open RAN (O-RAN)?

A.   A wireless-industry initiative for designing and building 5G radio access networks

B.   A wireless network security protocol

C.   A cloud-based application framework

D.   A wireless communication protocol

4: What is Beamforming used for?

A.   Reducing noise interference

B.   Extending wireless range

C.   To focus a wireless signal towards a specific receiving device

D.   Broadcasting a signal

5: What are Data Centers used for?

A.   Secure storage of data

B.   Web hosting

C.   Housing business-critical applications and information

D.   Automated server-side processing

6: _____ can be defined as systems that support electronically executed business transactions.

A.   Ecommerce

B.   B2B

C.   C2C

D.   B2C

7: A network that spans a large physical distance is called a ________.

A.   WAN

B.   LAN

C.   MAN

D.   PAN

8: A network's ____ is the arrangement of computers and mobile devices, printers, and other devices.

A.   Physical topology

B.   Logical topology

C.   Theoretical topology

D.   All of the abvoe

9: A tcp three-way handshake is used to establish a ___________ messaging method.

A.   Asynchronous

B.   Connection-oriented

C.   Frequency division

D.   Application net

E.   Connectionless

10: A(n) ______ is a program that extends the capability of a browser.

A.   Plug-in

B.   Aggregator

C.   Magnifier

D.   Power-up

11: Bluetooth can be used to create a _____, to communicate among computerized devices.

A.   Personal area network

B.   Wide area network

C.   Local area network

D.   Metropolitan area network

12: Broadband is measured in _____ .

A.   Bits per second.

B.   Relays per second.

C.   Moles per second.

D.   Parts per million.

E.   Joules per second.

13: Conventional dial-up connects to the internet at a maximum of ____.

A.   56 Kbps

B.   90 Kbps

C.   56 mbps

D.   112 Kbps

14: If networked, ____ can be accessed by an authorized lan user.

A.   Scanners

B.   High-powered storage devices

C.   Photo printers

D.   All of the above

15: In comparison with primary storage, hard drives are ________.

A.   More expensive

B.   Slower in processing digital information

C.   More volatile and lose data

D.   Faster in processing digital information

16: Internet addresses that are temporarily assigned are called ________ addresses.

A.   Dynamic

B.   Static

C.   Point-to-point

D.   Ethernet

17: Internet networks are _____.

A.   Bit-switched networks

B.   Circuit-switched networks

C.   Data-switched networks

D.   Packet-switched networks

E.   Byte-switched networks

18: Intranets are also called _____.

A.   Newsgroups.

B.   Hotspots.

C.   Corporate portals.

D.   Universal resource locators

19: ____ software searches a node for open ports.

A.   Phishing

B.   Sniffing

C.   Authentication

D.   Port scanner

20: ______ is the process of dividing a hard disk into tracks and sectors.

A.   Tracking

B.   Formatting

C.   Crashing

D.   Allotting

21: A ____ connects all lan central nodes in a group of buildings.

A.   Zone network

B.   Metro network

C.   Wide area network

D.   Proximity network

22: All of the following operating systems support p2p networking except ________.

A.   Windows

B.   OS X

C.   Unix

D.   Linux

23: Direct internet connections are typically ____ connections.

A.   Broadband

B.   Wireless

C.   Both a and b

D.   None of the above

24: Dsl and fttp are examples of wired ______ internet service technologies.

A.   Fidelity

B.   Broadband

C.   Analog

D.   Satellite

25: Dsl connections usually use ____ to secure connections

A.   PPPoE

B.   PPoE

C.   Both a and b

D.   None of the above

26: Ethernet networks ____.

A.   Are based on the star topology.

B.   Are based on the bus topology.

C.   Are based on the mesh topology.

D.   None of the above

27: In ____ transmission, data can move in both directions at the same time, such as with a telephone.

A.   Full-duplex

B.   Full-simplex

C.   Half-simplex

D.   Half-duplex

28: The ____ topology consists of a simple cable, or bus, to which all devices attach.

A.   Bus/tree

B.   Ring star

C.   Token ring

D.   Star

29: Kerberos __________ provides tickets to clients who request services.

A.   KDS

B.   TGS

C.   AS

D.   VPN.

30: A wireless _________ is the device that all nodes connect to in order communicate wirelessly.

A.   Surge protector

B.   Countermeasure

C.   Access point

D.   Scareware

31: A ____ server hosts only one site.

A.   Scripting

B.   Promoting

C.   Dedicated

D.   Submission

32: Talkwalker and twubs are examples of ____ search engines and tools.

A.   Hashtag

B.   Options button

C.   Authority

D.   Keywords

33: Icmp type ____ is used for echo request packets.

A.   2

B.   4

C.   6

D.   8

34: Fibre channel can support the interconnection of up to ____ devices only.

A.   56

B.   256

C.   126

D.   512

35: Gabrielle is planning to connect selected devices to the network wirelessly with a wireless ____.

A.   Hotspot

B.   Access point

C.   Hub

D.   Data point

36: Digital camcorders are similar to conventional ____ camcorders.

A.   Electronic

B.   Manual

C.   Analog

D.   Binary

37: A 200-mhz motherboard has its chipset chips all timed by a _______________ crystal.

A.   100-MHz

B.   200-MHz

C.   100-GHz

D.   200-GHz

38: Each clock cycle the cpu spends waiting for a slower device is called a ____.

A.   Suspend state

B.   Block state

C.   Hold state

D.   Wait state

39: A(n) _____ is the equivalent to a subsystem.

A.   Collaboration

B.   Partition

C.   Layer

D.   Factor

E.   Abstraction

40: In dolby digital 7.1, the 1 indicates a ________ speaker.

A.   Digital

B.   Subwoofer

C.   Tweeter

D.   Cross-over

41: In most current systems, ________ is the type of ram used.

A.   DDR2

B.   DDR3

C.   DRAM

D.   SDRAM

42: In all parity memory uses __________.

A.   3 bits

B.   9 bits

C.   18 bits

D.   27 bits

43: Multifactor authentication is all of these except _____.

A.   What you are

B.   What you have

C.   What you know

D.   What you calculate.