computer MCQs

9th • Chapter 06

50 Questions TextBook
1

What are devices like computers, smartphones, and printers connected to a network called?

A
Links
B
Nodes
C
Switches
D
Routers
2

Which component of a computer network refers to the connections between nodes, like Ethernet cables or Wi-Fi?

A
Switches
B
Routers
C
Nodes
D
Links
3

What is the primary objective of computer networks that involves sharing devices like printers and storage?

A
Data Communication
B
Connectivity
C
Resource Sharing
D
Collaboration
4

Which of these is an example of data communication facilitated by networks?

A
Sharing a single printer
B
Video conferencing with Zoom
C
A team working on a shared document
D
Remote access to a computer
5

In the components of data communication, what does the 'Sender' do?

A
Receives the data
B
Is the data being communicated
C
Governs the communication
D
Sends the data
6

What is a set of rules governing data communication called?

A
Message
B
Medium
C
Protocol
D
Receiver
7

At which layer of the OSI model does a switch primarily operate?

A
Physical Layer
B
Network Layer
C
Data Link Layer
D
Transport Layer
8

What type of address does a switch use to forward data to the correct device?

A
IP address
B
MAC address
C
Port address
D
Network address
9

What is the main function of a router in a network?

A
Connect devices within the same network
B
Direct data packets between different networks
C
Amplify the wireless signal
D
Convert digital signals to analog
10

A router uses a ________ to decide the best path for data packets.

A
Switching table
B
MAC table
C
Routing table
D
ARP table
11

Which device facilitates the connection of wireless devices to a wired network?

A
Switch
B
Hub
C
Modem
D
Access Point (AP)
12

Access Points use what to transmit data wirelessly?

A
Infrared light
B
Microwaves
C
Radio waves
D
Sound waves
13

Which network topology involves all devices sharing a single communication line called a bus?

A
Star
B
Ring
C
Mesh
D
Bus
14

In which topology is every device connected to every other device, providing high redundancy?

A
Bus
B
Star
C
Mesh
D
Ring
15

What is a major disadvantage of a Ring topology if a single connection fails?

A
Only the failed device is affected
B
Data reroutes automatically
C
The entire network is affected
D
Performance slows down slightly
16

Which transmission mode allows data to flow in only one direction, like a keyboard to a computer?

A
Half-Duplex
B
Full-Duplex
C
Simplex
D
Multiplex
17

Walkie-talkies are an example of which communication mode, where transmission can occur in both directions but not simultaneously?

A
Simplex
B
Half-Duplex
C
Full-Duplex
D
Uniplex
18

Telephone conversations, where both people can talk and listen at the same time, are an example of ________ communication.

A
Simplex
B
Half-Duplex
C
Full-Duplex
D
Audio-Duplex
19

How many layers are there in the OSI networking model?

A
3
B
5
C
7
D
9
20

Which OSI layer is responsible for the actual physical connection between devices, including cables and connectors?

A
Data Link Layer
B
Physical Layer
C
Network Layer
D
Session Layer
21

The Network Layer of the OSI model uses which type of address to route data between networks?

A
MAC address
B
Physical address
C
IP address
D
Hardware address
22

Which OSI layer ensures reliable data transfer from a process on a source machine to a process on a destination machine?

A
Network Layer
B
Session Layer
C
Application Layer
D
Transport Layer
23

The Presentation Layer is responsible for what function?

A
Managing sessions
B
Routing packets
C
Data encryption and translation
D
Physical connection
24

Email, web browsing, and file transfer services are provided by which OSI layer?

A
Application Layer
B
Presentation Layer
C
Session Layer
D
Transport Layer
25

How many bits make up an IPv4 address?

A
16 bits
B
32 bits
C
64 bits
D
128 bits
26

What was the primary reason for the development of IPv6?

A
To increase speed
B
To address the depletion of IPv4 addresses
C
To simplify the OSI model
D
To add more security features
27

Which protocol is used for transferring web pages over the internet?

A
FTP
B
SMTP
C
HTTP
D
TCP
28

What is the function of the Domain Name System (DNS)?

A
Assigns IP addresses automatically
B
Translates domain names to IP addresses
C
Secures data communication
D
Ensures reliable data transfer
29

Which protocol automatically assigns IP addresses to devices on a network?

A
DNS
B
HTTP
C
TCP
D
DHCP
30

What is a security system that monitors and controls incoming and outgoing network traffic?

A
Antivirus
B
Firewall
C
Encryption key
D
Router
31

The process of transforming data into a secure format is known as:

A
Decryption
B
Authentication
C
Firewalling
D
Encryption
32

Malicious software such as viruses, worms, and ransomware is collectively known as:

A
Phishing
B
Malware
C
Spam
D
Adware
33

What type of network attack involves overwhelming a network with traffic to make it unavailable?

A
Man-in-the-Middle
B
Phishing
C
Denial of Service (DoS)
D
Malware
34

A network used for communication between personal devices like a smartphone and a wireless headset is a:

A
LAN
B
WAN
C
PAN
D
MAN
35

What type of network connects computers and devices within a limited area like a home or school?

A
PAN
B
WAN
C
LAN
D
MAN
36

A network that spans a city or a large campus, connecting multiple LANs, is called a:

A
MAN
B
WAN
C
CAN
D
LAN
37

What is the largest example of a Wide Area Network (WAN)?

A
A university campus network
B
A city's public Wi-Fi
C
The Internet
D
A corporate office network
38

A Campus Area Network (CAN) connects multiple LANs within a:

A
City
B
Country
C
Limited geographical area like a university campus
D
Worldwide scale
39

Which protocol from the TCP/IP suite ensures reliable data transfer?

A
IP
B
UDP
C
TCP
D
DHCP
40

Which protocol provides faster but less reliable data transfer compared to TCP?

A
HTTP
B
FTP
C
UDP
D
IP
41

The first message sent over ARPANET, the precursor to the internet, was 'LO'. What was it meant to be?

A
HELLO
B
LOGON
C
LOGIN
D
LOAD
42

What does SIM in a SIM card stand for?

A
Subscriber Information Module
B
Subscriber Identity Module
C
Service Identity Model
D
Secure Information Module
43

In Bus topology, how do devices connect to the central cable?

A
Individually to a hub
B
In a circular loop
C
Directly
D
Through a router
44

Which layer of the OSI model handles error detection and correction for node-to-node data transport?

A
Physical Layer
B
Data Link Layer
C
Network Layer
D
Transport Layer
45

What is the term for the process of converting encrypted data back to its original form?

A
Encryption
B
Encoding
C
Decryption
D
Authentication
46

An attack where a third party intercepts communication between two parties to steal information is called:

A
Denial of Service
B
Phishing
C
Man-in-the-Middle
D
Malware injection
47

What is the typical range of a Personal Area Network (PAN)?

A
A few kilometers
B
A few meters
C
Across a city
D
Globally
48

Hospitals use what kind of systems to store and retrieve patient data efficiently over a network?

A
Learning Management Systems (LMS)
B
Electronic Health Records (EHR)
C
Domain Name Systems (DNS)
D
Firewall Systems
49

Which component is NOT one of the five basic components of data communication?

A
Sender
B
Receiver
C
Network
D
Protocol
50

The process of wrapping data with protocol information before transmission is called:

A
Encryption
B
Encapsulation
C
Switching
D
Routing