New past papers will be uploaded soon! New past papers will be uploaded soon!

Free MCQs & Online Quiz Practice for Exams

Review Mode Quiz Mode

    Q: Which type of signals are used in Bluetooth transmission?

    A) Electric waves
    B) Light waves
    C) Radio waves
    D) Magnetic waves

    Q: What is a collection of computers and devices interconnected by communication channels called?

    A) Channel
    B) Communication
    C) Network
    D) Topology

    Q: In which transmission does data flow only in one direction from the sending device to the receiving device?

    A) Simplex
    B) Duplex
    C) Half Duplex
    D) Full Duplex

    Q: In which network architecture is there one dedicated computer which is called a server?

    A) Dedicated
    B) Point-to-Point
    C) Peer-to-Peer
    D) Client/Server

    Q: Which network connects computers and devices in a limited geographic area such as one building, one office, or a group of buildings close together?

    A) WAN
    B) LAN
    C) NAN
    D) MAN

    Q: What is the physical layout of joining a number of computers in the form of a network called?

    A) Layout
    B) Connection
    C) Network
    D) Topology

    Q: In which network topology are all nodes connected to a common communication medium or central cable?

    A) Bus
    B) Ring
    C) Star
    D) Mesh

    Q: Internet is the example of which type of network?

    A) LAN
    B) WAN
    C) MAN
    D) Both b and c

    Q: DSL stands for:

    A) Digital Service Line
    B) Domain Service Line
    C) Digital Subscriber Line
    D) None

    Q: In which network topology are all nodes connected to a common communication device?

    A) Bus
    B) Ring
    C) Star
    D) Mesh

    Q: Internet browsing is the example of which mode?

    A) Simplex
    B) Half-Duplex
    C) Full-Duplex
    D) Both b and c

    Q: Which of the following refers to any crime that involves a computer and a network?

    A) Robbery
    B) Theft
    C) Cyber Crime
    D) Shop lifting

    Q: What is gaining unauthorized access to computers or telecommunications systems called?

    A) Hacking
    B) Cracking
    C) Lacking
    D) Tracking

    Q: Which of the following is a kind of malicious software written intentionally to enter a computer without the user's permission or knowledge?

    A) Database
    B) Word processor
    C) Virus
    D) Antivirus

    Q: Which programs are capable of locating, preventing, and removing malicious programs from a computer system?

    A) Database
    B) Word processor
    C) Virus
    D) Antivirus

    Q: Which of the following should not be written down or shared with others?

    A) Password
    B) User ID
    C) Program
    D) Data

    Q: What types of cards are often used to gain entry into areas and buildings with restricted access?

    A) Mobile cards
    B) Memory cards
    C) Access cards
    D) Wild cards

    Q: Which form of authentication provides the physiological makeup of the human body?

    A) Password
    B) User ID
    C) PIN
    D) Biometrics

    Q: Which of the following has concern with the correct handling of personal information?

    A) Accuracy
    B) Privacy
    C) Authority
    D) Authentication

    Q: Which of the following is the exclusive legal right that prohibits copying of intellectual property?

    A) Legal right
    B) Copyright
    C) Book right
    D) Altright
Bootstrap Footer Square Arrow Go to Top Button