125
67.8k

310+ Computer Architecture and Organization Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) .

1.

When collection of various computers seems a single coherent system to its client, then it is called                    

A. computer network
B. distributed system
C. networking system
D. mail system
Answer» B. distributed system
Explanation: a computer network is defined as a collection of interconnected computers which uses a single technology for connection.
2.

Two devices are in network if                      

A. a process in one device is able to exchange information with a process in another device
B. a process is running on both devices
C. pids of the processes running of different devices are same
D. a process is active and another is inactive
Answer» A. a process in one device is able to exchange information with a process in another device
Explanation: a computer network, or data network, is a digital telecommunications network which allows nodes to share resources. in computer networks, computing devices exchange data with each other using connections between nodes. the nodes have certain processes which enable them to share a specific type of data using a distinct protocol.
3.

Which of the following computer networks is built on the top of another network?

A. prior network
B. chief network
C. prime network
D. overlay network
Answer» D. overlay network
Explanation: an overlay network is a computer network that is built on top of another network. some examples of an overlay network are virtual private networks (vpn) and peer-to-peer networks (p2p).
4.

In computer network nodes are                    

A. the computer that originates the data
B. the computer that routes the data
C. the computer that terminates the data
D. all of the mentioned
Answer» D. all of the mentioned
Explanation: in a computer network, a node can be anything that is capable of sending data or receiving data or even routing the data to its destination. routers, computers and smartphones are some examples of network nodes.
5.

Communication channel is shared by all the machines on the network in                  

A. broadcast network
B. unicast network
C. multicast network
D. anycast network
Answer» A. broadcast network
Explanation: in a broadcast network, information is sent to all stations in a network whereas in a multicast network the data or information is sent to a group of stations in the network. in unicast network, information is sent to only one specific station. the broadcast address of the network is the last assigned address of the network.
6.

Bluetooth is an example of                      

A. personal area network
B. local area network
C. virtual private network
D. wide area network
Answer» A. personal area network
Explanation: bluetooth is a wireless technology used to create a wireless personal area network for data transfer up to a distance of 10 meters. it operates on 2.45 ghz frequency band for transmission.
7.

A                      is a device that forwards packets between networks by processing the routing information included in the packet.

A. bridge
B. firewall
C. router
D. hub
Answer» C. router
Explanation: a router is a networking device that forwards data packets between computer networks. routers perform the traffic directing functions on the internet. they make use of routing protocols like rip to find the cheapest path to the destination.
8.

A list of protocols used by a system, one protocol per layer, is called                  

A. protocol architecture
B. protocol stack
C. protocol suite
D. protocol system
Answer» B. protocol stack
Explanation: a protocol stack refers to a group of protocols that are running concurrently that are employed for the implementation of network protocol suite. each layer in the network model has to use one specific protocol from the protocol stack.
9.

Network congestion occurs                    

A. in case of traffic overloading
B. when a system terminates
C. when connection between two nodes terminates
D. in case of transfer failure
Answer» A. in case of traffic overloading
Explanation: network congestion occurs when traffic in the network is more than the network could handle. to avoid network congestion, the network management uses various open-loop and closed-loop congestion control techniques.
10.

Which of the following networks extends a private network across public networks?

A. local area network
B. virtual private network
C. enterprise private network
D. storage area network
Answer» B. virtual private network
Explanation: a virtual private network extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.vpn provides enhanced security and online anonymity to users on the internet. it is also used to unblock websites which are unavailable in certain regions.
11.

Physical or logical arrangement of network is                      

A. topology
B. routing
C. networking
D. control
Answer» A. topology
Explanation: topology in networks is the structure or pattern in which each and every node in the network is connected. there are many topologies in networking like bus, tree, ring, star, mesh, and hybrid topology. there is no particular best topology and a suitable topology can be chosen based on the kind of application of the network .
12.

Which network topology requires a central controller or hub?

A. star
B. mesh
C. ring
D. bus
Answer» A. star
Explanation: in star topology, no computer is connected to another computer directly but all the computers are connected to a central hub. every message sent from a source computer goes through the hub and the hub then forwards the message only to the intended destination computer.
13.

               topology requires a multipoint connection.

A. star
B. mesh
C. ring
D. bus
Answer» D. bus
Explanation: in bus topology, there is a single cable to which all the network nodes are connected. so whenever a node tries to
14.

Data communication system spanning states, countries, or the whole world is

A. lan
B. wan
C. man
D. pan
Answer» B. wan
Explanation: wan is the abbreviation for wide area network. this network extends over a large geographical area. wans are used to connect cities, states or even countries. a wireless connection is required to build a wan. the best example of wan is the internet.
15.

Data communication system within a building or campus is                 

A. lan
B. wan
C. man
D. pan
Answer» A. lan
Explanation: lan is an abbreviation for local area network. this network interconnects computers in a small area such as schools, offices, residence etc. it is the most versatile kind of data communication system where most of the computer network concepts can be visibly used.
16.

WAN stands for                      

A. world area network
B. wide area network
C. web area network
D. web access network
Answer» B. wide area network
Explanation: wan is the abbreviation for wide area network. this network extends
17.

In TDM, slots are further divided into

A. seconds
B. frames
C. packets
D. bits
Answer» B. frames
Explanation: tdm is the abbreviation for time division multiplexing. it is technique for combining several low rate channels to a single high rate channel. for a certain time slot, the several channels could use the maximum bandwidth. each channel is inactive for a period of time too. some other multiplexing techniques are frequency division multiplexing and phase division multiplexing.
18.

           is the multiplexing technique that shifts each signal to a different carrier frequency.

A. fdm
B. tdm
C. both fdm & tdm
D. pdm
Answer» A. fdm
Explanation: fdm is an abbreviation for frequency division multiplexing. this technique is used when the bandwidth of the channel is greater than the combined bandwidth of all the signals which are to be transmitted. the channel is active at all times unless a collision occurs with another channel trying to use the same frequency. some other multiplexing techniques are time division multiplexing and phase division multiplexing.
19.

What is internet?

A. a single network
B. a vast collection of different networks
C. interconnection of local area networks
D. interconnection of wide area networks
Answer» B. a vast collection of different networks
Explanation: internet is nothing but an interconnected computer network providing a variety of communication facilities, consisting of a huge amount of small networks using standardized communication protocols.
20.

To join the internet, the computer has to be connected to a                    

A. internet architecture board
B. internet society
C. internet service provider
D. different computer
Answer» C. internet service provider
Explanation: the isps (internet service providers) are the main agents through which every computer is connected to the internet. they are licensed to allot public ip addresses to its customers in order to connect them to the internet.
21.

Internet access by transmitting digital data over the wires of a local telephone network is provided by                

A. leased line
B. digital subscriber line
C. digital signal line
D. digital leased line
Answer» B. digital subscriber line
Explanation: dsl (digital subscriber line) is the technology designed to use the existing telephone lines to transport high-bandwidth data to service subscribers. dsl was used to allow the early users access to the internet and it provides dedicated, point-to-point, public network access.
22.

3 OVERVIEW OF INTERNET

A. internet exchange point
B. subscriber end point
C. isp end point
D. internet end point
Answer» A. internet exchange point
Explanation: isps exchange internet traffic between their networks by using internet exchange points. isps and cdns are connected to each other at these physical locations are they help them provide better service to their customers.
23.

Which of the following protocols is used in the internet?

A. http
B. dhcp
C. dns
D. dns, http and dns
Answer» D. dns, http and dns
Explanation: http is used to browse all the websites on the world wide web, dhcp is used to allot ips automatically to the users on the internet, and dns is used to connect the users to the host servers on the internet based on the domain name.
24.

Internet works on                

A. packet switching
B. circuit switching
C. both packet switching and circuit switching
D. data switching
Answer» A. packet switching
Explanation: packet switching is the method based on which the internet works. packet switching features delivery of packets of data between devices over a shared network.
25.

Which one of the following is not an application layer protocol used in internet?

A. remote procedure call
B. internet relay chat
C. resource reservation protocol
D. local procedure call
Answer» C. resource reservation protocol
Explanation: resource reservation protocol is a transport layer protocol used on the internet. it operates over ipv4 and ipv6 and is designed to reserve resources required by the network layer protocols.
26.

Which protocol assigns IP address to the client connected in the internet?

A. dhcp
B. ip
C. rpc
D. rsvp
Answer» A. dhcp
Explanation: dhcp stands for domain host control protocol. it is responsible to remotely assign ip address to the clients connected to the internet. the server that performs this fuction is called the dhcp server.
27.

Which one of the following is not used in media access control?

A. ethernet
B. digital subscriber line
C. fiber distributed data interface
D. packet switching
Answer» D. packet switching
Explanation: packet switching is not really related to media access control as it just features delivery of packets of data between devices over a shared network. internet is actually based on packet switching.
28.

Which level is the network layer in the OSI model?

A. third level
B. fourth level
C. second level
D. fifth layer
Answer» A. third level
Explanation: the network layer is the third level of the open system interconnection model and the layer that provides data routing paths for network communication.
29.

Data in network layer is transferred in the form of                          

A. layers
B. packets
C. bytes
D. bits
Answer» B. packets
Explanation: data is transferred in the form of packets via logical network paths in an ordered format controlled by the network layer.
30.

The network layer contains which hardware device?

A. routers, bridges
B. bridges only
C. bridges and switches
D. routers, bridges and switches
Answer» D. routers, bridges and switches
Explanation: this layer contains hardware devices such as routers, bridges, firewalls, and switches, but it actually creates a logical image of the most efficient communication rout and implements it with a physical medium.
31.

Network layer protocol exits in                    

A. host
B. switches
C. packets
D. bridges
Answer» A. host
Explanation: network layer protocols exits in every host or router. the router examines the header fields of all the ip packets that pass through it.
32.

What are the common protocols associated with the network layer?

A. address resolution protocol
B. reverse address resolution protocol
C. internet protocol
D. neighbour discovery protocol
Answer» C. internet protocol
Explanation: internet protocol and netware ipx/spx are the most common protocols associated with the network layer.
33.

The network layer responds to request from which layer?

A. transport layer
B. data layer
C. application layer
D. session layer
Answer» A. transport layer
Explanation: in osi model, we are having 7 layers in which the network layer responds to request from the layer above it called transport layer.
34.

The network layer issues request to which layer?

A. transport layer
B. data layer
C. application layer
D. session layer
Answer» B. data layer
Explanation: in osi model, we are having 7 layers in which the network layer issues request to the layer below it called data link layer.
35.

IP is connectionless.

A. true
B. false
Answer» A. true
Explanation: ip is connectionless, is that a data packet can travel from a sender to a receiver without the recipient having to send an acknowledgment connection-oriented protocols exits at other, higher layers of the osi model.
36.

Does network layer in TCP/IP and OSI Model are same.

A. true
B. false
Answer» B. false
Explanation: the tcp/ip internet layer is in fact only a subset of functionality of the network layer. it describes only one type of network architecture, the internet.
37.

What are called routers?

A. the devices that operates at session layer
B. the devices that operates at data layer
C. the devices that operates at application layer
D. the devices that operates at network
Answer» D. the devices that operates at network
Explanation: the network interconnection devices that operate at the network layer are usually called routes, which at this point should hopefully come as no surprise to you.
38.

ICMP stands for                      

A. internet coordinate message protocol
B. internet control message protocol
C. interconnect control message protocol
D. interconnect coordinate message protocol
Answer» B. internet control message protocol
Explanation: the internet protocol is the key network layer protocol that implements the tcp/ip protocol suites. since ip is the protocol that provides the mechanism for delivering datagrams, between devices, it is designed to be relatively basic, and to function with few “bell and whistles”.
39.

Packets will be transferred in how many types?

A. 5 types
B. 4 types
C. 2 types
D. 3 types
Answer» D. 3 types
Explanation: routing deals with determining how packet will routed (transferred) from source to destination. it can of three types : 1. static
40.

DDP stands for                    

A. datagram delivery protocol
B. device delivery protocol
C. datagram device protocol
D. device datagram protocol
Answer» A. datagram delivery protocol
Explanation: datagram delivery protocol is a member of the appletalk networking protocol suite. its main responsibility is for socket to socket delivery of datagram over an appletalk network.
41.

RIP stands for                  

A. reduced information protocol
B. routing internet protocol
C. routing information protocol
D. reduced internet protocol
Answer» C. routing information protocol
Explanation: the routing information protocol is one of the oldest distance vector routing protocols which employ the hop count as a routing metric.
42.

The                          model is 7-layer architecture where each layer is having some specific functionality to perform.

A. tcp/ip
B. cloud
C. osi
D. ois
Answer» C. osi
Explanation: the osi model is 7-layer architecture where each layer is having some specific functionality to perform. all these layers work in collaboration for transmitting the data from 1 person to another worldwide.
43.

The full form of OSI is OSI model is

A. open systems interconnection
B. open software interconnection
C. open systems internet
D. open software internet
Answer» A. open systems interconnection
Explanation: the osi model is 7-layer architecture where each layer is having some specific functionality to perform. all these layers work in collaboration for transmitting the data from 1 person to another worldwide.
44.

Which of the following is not physical layer vulnerability?

A. physical theft of data & hardware
B. physical damage or destruction of data & hardware
C. unauthorized network access
D. keystroke & other input logging
Answer» C. unauthorized network access
Explanation: unauthorized network access is
45.

In                                      layer, vulnerabilities are directly associated with physical access to networks and hardware.

A. physical
B. data-link
C. network
D. application
Answer» A. physical
Explanation: in the physical layer, vulnerabilities are directly associated with physical access to networks and hardware such as unauthorised network access, damage or destruction of data & hardware and keystroke & other input logging.
46.

Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer.

A. true
B. false
Answer» A. true
Explanation: loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer. other such issues are unauthorised network access, damage or destruction of data & hardware and keystroke & other input logging.
47.

Which of the following is not a vulnerability of the data-link layer?

A. mac address spoofing
B. vlan circumvention
C. switches may be forced for flooding traffic to all vlan ports
D. overloading of transport-layer mechanisms
Answer» D. overloading of transport-layer mechanisms
Explanation: mac address spoofing, vlan circumvention and switches may be
48.

                         is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls.

A. vlan attack
B. vlan circumvention
C. vlan compromisation method
D. data-link evading
Answer» B. vlan circumvention
Explanation: vlan circumvention is data- link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls implemented using subnets and firewalls.
49.

                                may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN.

A. switches
B. routers
C. hubs
D. repeaters
Answer» A. switches
Explanation: switches may be forced for flooding traffic to all vlan ports allowing interception of data through any device that are connected to a vlan. it is a vulnerability of data link layer.
50.

Which of the following is not a vulnerability of the network layer?

A. route spoofing
B. identity & resource id vulnerability
C. ip address spoofing
D. weak or non-existent authentication
Answer» D. weak or non-existent authentication
Explanation: weak or non-existent authentication is a vulnerability of the session layer. route spoofing, identity & resource id vulnerability & ip address spoofing are examples of network layer vulnerability.

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.