info@jobexams.pk
Home
All Categories
Basic Computer MCQs
Everyday Science MCQs
General Knowledge MCQs
Islamic Studies MCQs
Pakistan Current Affairs MCQs
Pakistan Studies MCQs
English MCQs
Urdu MCQs
Chemistry MCQs
Law MCQs
Election Act 2017 MCQs
PERA MCQ's
Pakistan Constitution MCQs
Criminal Procedure Code (CrPC) MCQs
Past Papers
Blogs
Practice Tests
Question
1
18:00
Which topology uses a central hub to connect all devices?
Bus
Ring
Mesh
Star
Next
What does NIC stand for in networking?
Network Internal Connection
Network Interface Card
National Internet Code
None of the above
Previous
Next
What is the default port number for HTTP?
20
21
80
443
Previous
Next
A MAC address is associated with which hardware?
Monitor
Hard Disk
Network Interface Card (NIC)
RAM
Previous
Next
An error in software or hardware is called a bug. What is the alternative computer jargon for it?
Leech
Squid
Slug
Glitch
Previous
Next
Who invented the high-level programming language “C”?
Dennis M. Ritchie
Niklaus Wirth
Seymour Papert
Donald Knuth
Previous
Next
Which command is used to test network connectivity?
ipconfig
ping
route
netstat
Previous
Next
Which IP address range is reserved for private networks?
192.0.0.0 – 192.255.255.255
10.0.0.0 – 10.255.255.255
172.0.0.0 – 172.255.255.255
8.8.8.8 – 8.8.8.9
Previous
Next
In networking, what is the function of a DNS server?
Converts IP to MAC address
Converts domain names to IP addresses
Sends data to the next hop
Encrypts outgoing messages
Previous
Next
What is the purpose of a firewall in a network?
Boost signal strength
Prevent unauthorized access
Convert IP to MAC
Format data packets
Previous
Next
What does IP stand for in computer networking?
Internet Path
Internal Protocol
Internet Protocol
Integrated Process
Previous
Next
Modern computers are very reliable but they are not __________?
Fast
Powerful
Infallible
Cheap
Previous
Next
Which of the following is an advantage of networking?
Increased data redundancy
Increased software costs
Centralized data access
Manual data transfer
Previous
Next
In a peer-to-peer network, each computer can act as:
Only a client
Only a server
Both client and server
None of the above
Previous
Next
Second Generation computers were developed during___________?
1949 to 1955
1956 to 1965
1965 to 1970
1970 to 1990
Previous
Next
Unwanted repetitious messages, such as unsolicited bulk e-mail is known as_________?
Spam
Trash
Calibri
Courier
Previous
Next
The computer size was very large in__________?
First Generation
Second Generation
Third Generation
Fourth Generation
Previous
Next
Which layer of the OSI model is responsible for data encryption?
Session Layer
Presentation Layer
Transport Layer
Application Layer
Previous
Next
Which of the following is a connectionless protocol?
TCP
HTTP
FTP
UDP
Previous
Next
Personal computers use a number of chips mounted on a main circuit board. What is the common name for such boards?
Daughter board
Motherboard
Father board
Breadboard
Previous
Submit Test