Computer Architecture Mock Test

1. When collection of various computers seems a single coherent system to its client, then it is called

2. Two devices are in network if

3. Which of the following computer networks is built on the top of another network?

4. In computer network nodes are

5. Communication channel is shared by all the machines on the network in

6. Which of the following networks extends a private network across public networks?

7. Which network topology requires a central controller or hub?

8. Which one of the following is not used in media access control?

9. Data communication system spanning states, countries, or the whole world is

10. Physical or logical arrangement of network is

11. Data communication system within a building or campus is

12. Which one of the following is not an application layer protocol used in internet?

13. The model is 7-layer architecture where each layer is having some specific functionality to perform.

14. Which protocol assigns IP address to the client connected in the internet?

15. Which level is the network layer in the OSI model?

16. The full form of OSI is OSI model is

17. Data in network layer is transferred in the form of

18. The network layer contains which hardware device?

19. DDP stands for

20. RIP stands for

21. topology requires a multipoint connection.

22. Which of the following is not physical layer vulnerability?

23. Properties of Fourier transform are

24. Which of the following is an example of data-link layer vulnerability?

25. Header of a frame generally contains

26. In the digital communication system, signals in different frequency bands are

27. CRC stands for

28. Properties of impulse function are

29. A base-band signal can be up-converted using

30. Which sublayer of the data link layer performs data link functions that depend upon the type of medium?

31. Which of the following is an example of network layer vulnerability?

32. A band-pass signal can be down-converted using

33. In down-conversion multiplication with cosine wave is followed by

34. Which of the following is an example of physical layer vulnerability?

35. Which of the following tasks is not done by data link layer?

36. When 2 or more bits in a data unit has been changed during the transmission, the error is called

37. Which of the following is a data link protocol?

38. Which can be used as an intermediate device in between transmitter entity and receiver entity?

39. What is interframe gap?

40. MAC address is of

41. The time required to transmit frame depends on

42. The maximum size of payload field in ethernet frame is

43. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called

44. What is WPA?

45. Window given the number of

46. In wireless ad-hoc network

47. Routing is

Computer Science Engineering Mock Tests with Answers
Distributed Computing System Mock Test
Software Project Management Mock Test
Artificial Intelligence and Robotics Mock Test
Basics of Database Management Mock Test
C# Programming Mock Test
C#.NET Programming Mock Test
Cloud Computing Mock Test
Communication Network Mock Test
Computer Architecture Mock Test
Computer Architecture and Organization Mock Test
Computer Fundamentals Mock Test
Computer Networking Mock Test
Computer Networks Mock Test
CPP Programming Mock Test
Data Analysis Mock Test
Data Communication and Computer Network Mock Test
Data Compression and Data Retrieval Mock Test
Data Mining and Business Intelligence Mock Test
Data Mining and Data Warehouse Mock Test
Data Structure and Algorithms Mock Test
Data Structures Mock Test
DataBase Management System Mock Test
Design and Analysis of Algorithms Mock Test
Digital Electronics and Logic Design Mock Test
Digital Logic Circuits Mock Test
Digital Principles and System Design Mock Test
Discrete Mathematics Mock Test
Discrete Structure Mock Test
DotNet Technology Mock Test
Embedded Real Time Operating System Mock Test
Green Computing Mock Test
High Performance Computing Mock Test
Information Cyber Security Mock Test
Information and Network Security Mock Test
Information Retrival Techniques Mock Test
Information Systems and Engineering Economics Mock Test
Machine Learning Mock Test
Microprocessor and Interfacing Technique Mock Test
Microprocessors Mock Test
Muli core Architectures and Pro Mock Test
Multi core processors Mock Test
Network Security Mock Test
Neural Networks and Fuzzy Control
Object Oriented Programming Mock Test
Operating System Architecture Mock Test
Operating System Mock Test
Problem Solving and Python Programming Mock Test
Programming for Problem Solving Mock Test
Python Programming Mock Test
Soft Computing Mock Test
Software Design Modeling Mock Test
Software Engineering Mock Test
Software Testing Mock Test
Software Testing and Quality Assurance Mock Test
Theory of Computation and Compiler Design Mock Test
Theory of Computation Mock Test
Ubiquitous Computing System Mock Test