Computer Science :: All Aptitude Test ::

1. Internet explorer falls under
A. Operating System
B. Compiler
C. Browser
D. Operating System

2.Which address is used in an internet employing the TCP/IP protocols?
A. physical address and logical address
B. port address
C. specific address
D. physical address and logical address

3.Which address identifies a process on a host?
A. physical address
B. logical address
C. port address
D. physical address

4. Transmission data rate is decided by
A. network layer
B. physical layer
C. data link layer
D. network layer

5.When collection of various computers seems a single coherent system to its client, then it is called
A. computer network
B. distributed system
C. both (a) and (b)
D. computer network

6.Two devices are in network if
A. a process in one device is able to exchange information with a process in another device
B. a process is running on both devices
C. PIDs of the processes running of different devices are same
D. a process in one device is able to exchange information with a process in another device

7. Which one of the following computer network is built on the top of another network?
A. prior network
B. chief network
C. prime network
D. prior network

8.In computer network nodes are
A. the computer that originates the data
B. the computer that routes the data
C. the computer that terminates the data
D. the computer that originates the data

9.Communication channel is shared by all the machines on the network in
A. unicast network
B. multicast network
C. broadcast network
D. unicast network

10.Bluetooth is an example of
A. personal area network
B. local area network
C. virtual private network
D. personal area network

11. A _____ is a device that forwards packets between networks by processing the routing information included in the packet.
A. bridge
B. firewall
C. router
D. bridge

12.A list of protocols used by a system, one protocol per layer, is called
A. protocol architecture
B. protocol stack
C. protocol suit
D. protocol architecture

13.Network congestion occurs
A. in case of traffic overloading
B. when a system terminates
C. when connection between two nodes terminates
D. in case of traffic overloading

14.Which one of the following extends a private network across public networks?
A. local area network
B. virtual private network
C. enterprise private network
D. local area network

15.The IETF standards documents are called
A. RFC
B. RCF
C. ID
D. RFC

16.The structure or format of data is called
A. Syntax
B. Semantics
C. Struct
D. Syntax

17.Communication between a computer and a keyboard involves ______________ transmission
A. Automatic
B. Half-duplex
C. Simplex
D. Automatic

18.The first Network was
A. CNNET
B. NSFNET
C. ASAPNET
D. CNNET

19.The _______ is the physical path over which a message travels
A. path
B. Medium
C. Protocol
D. path

20.Which organization has authority over interstate and international commerce in the communications field?
A. ITU-T
B. IEEE
C. FCC
D. ITU-T

21.Which of this is not a network edge device?
A. PC
B. Smartphones
C. Servers
D. PC

22.A set of rules that governs data communication
A. Protocols
B. Standards
C. RFCs
D. Protocols

23.Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
A. CDMA
B. CDMA/CD
C. CDMA/CA
D. CDMA

24.What is the size of MAC Address?
A. 16-bits
B. 32-bits
C. 48-bits
D. 16-bits

25.This is what happens if two devices on the same Ethernet network determine the network is free, but attempt to transmit data at exactly the same time.
A. overlap
B. crossover
C. collision
D. overlap

26.This describes how the Ethernet protocol regulates communication among connection points.
A. Carrier Sense Multiple Access/Collision Detect
B. Discontinuous transmission
C. Aggregator
D. Carrier Sense Multiple Access/Collision Detect

27.802.11 wireless networking uses what method as the media access method?
A. CSMA/CD
B. CTS/RTS
C. CSMA/CA
D. CSMA/CD

28.____________ assigns a unique number to each IP network adapter called the MAC address.
A. Media Access Control
B. Metro Access Control
C. Metropolitan Access Control
D. Media Access Control

29.In ________ each station sends a frame whenever it has a frame to send.
A. pure ALOHA
B. slotted ALOHA
C. both (a) and (b)
D. pure ALOHA

30.In pure ALOHA, the vulnerable time is ______ the frame transmission time.
A. the same as
B. two times
C. three times
D. the same as


Date to Date Current Affairs 2022

PakMCQs.net

Quick Links

GAT Subject



   Computer Science    English Mcqs    Agriculture    

Engineering



   Computer Science    Civil Engineering    

Technical



   Networking    Electronics    Database    

Past Papers



   Model Papers    FPSC Papers