MCQ Questions on Computer Fundamentals

Computer Science Engineering

MCQ Questions on Computer Fundamentals

1- Which of the following is not an input device?

(A) Scanner

(B) Keyboard

(C) Mouse

(D) Speaker

 

2- Which of the following types of memory holds the computer’s start-up routine?

(A) Read Only Memory

(B) Random Access Memory

(C) Cache Memory

(D) Random Allocation Memory

 

3- Which one of the following is a cryptographic protocol used to secure HTTP connection?

(A) Explicit congestion notification (ECN)

(B) Transport layer security (TLS)

(C) Resource relocation protocol

(D) Session control transport protocol

 

4- Which one of the following is NOT an output device?

(A) Monitor

(B) Plotter

(C) Printer

(D) Scanner

 

5- Which of the following attacks is used by hackers for data interception?

(A) Phishing

(B) Denial of Service

(C) Network-tapping

(D) Sniffing

 

6- What is a “firewall” in a computer network?

(A) A web browsing software

(B) A system designed to prevent unauthorized access

(C) An operating system of the computer network

(D) The physical boundary of the network

 

7- Modern Information and Communication Technologies (ICT) includes

(i) Digital library (ii) Multimedia projector (iii) Multimedia personal computer

(A) Only (i)

(B) (i) and (ii)

(C) (ii) and (iii)

(D) (i), (ii) and (iii)

 

8- Consider the following statements w.r.t. Cloud Computing:

(i) Private cloud describes a “cloud services” that can be accessed only by a pre-defined group of people (ii) Private cloud provides elastic behavior as well as scalability

(iii) Scalability is that feature of cloud computing that alters the service to change in size or volume so as to meet user’s needs

(iv) A cloud environment can be accessed from anywhere globally as long as the user has access to the internet.

Which of the above statements are correct?

(A) (i), (ii) and (iii)

(B) (i), (ii) and (iv)

(C) (ii) and (iii)

(D) (i), (ii), (iii) and (iv)

 

9- ______ is a network technology that creates a Secure network connection to a trusted network or connects two corporate networks.

(A) ADSL

(B) VPN

(C) WLAN

(D) WiMax

 

10- What a firewall cannot do?

(A) Protection against social engineering attacks

(B) Content Filtering

(C) Caching the data

(D) Logging

 

11- WLAN devices are

(A) Access points

(B) Routers and gateways

(C) Antenna

(D) All of the above

 

12- The key combination used to minimize all open windows and display the desktop is

(A) Alt + F4

(B) Shift + M

(C) Windows Key + D

(D) CTRL + D

 

13- Bluetooth is an example of:

(A) personal area network

(B) local area network

(C) virtual private network

(D) None of the above

 

14- Length of an IPv6 address is ______ bytes.

(A) 4

(B) 16

(C) 32

(D) 64

 

15- SMTP stands for

(A) Simple Mail Technology Procedure

(B) Simple Mail Transfer Protocol

(C) Synchronous Mail Transfer Protocol

(D) None of the above

 

16- When http is used over SSL is known as_______

(A) 802.11

(B) Ciphering

(C) Firewall

(D) HTTPS

 

17- DHCP stands for

(A) Dynamic Host Control Protocol

(B) Dynamic Host Configuration Protocol

(C) Dynamic Hyper Control Protocol

(D) Dynamic Hyper Configuration Protocol

 

18- DNS stands for

(A) Data Network Security

(B) Domain Name System

(C) Domain Network Security

(D) None of the above

 

19- 802.10 IEEE standard is known as ______

(A) LAN security standard

(B) Internet working standard

(C) Email Standard

(D) Social Media Standard

 

20- NAT stands for___________

(A) Network Address Translation

(B) Network Authority of Telnet

(C) Network Application Transport

(D) Network Address Transition

 

ANSWERS:

1-(D), 2-(A), 3-(B), 4-(D), 5-(D), 6-(B), 7-(D), 8-(D), 9-(B), 10-(A), 11-(D), 12-(C), 13-(A), 14-(B), 15-(B), 16-(D), 17-(A), 18-(B), 19-(A), 20-(A)