NETWORKING MCQS

To move a copy of file from one computer to another over a communication channel is called?

A. File transfer
B. File encryption
C. File modification
D. File copying
Correct answer is: A. File transfer

                                      provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously?

A. Multitasking
B. Multithreading
C. Multiprocessin g
D. Multicomputin g
Correct answer is: A. Multitasking

All of the following are examples of real security and privacy risks EXCEPT                           ?

A. hackers
B. Spam
C. Viruses
D. identity theft
Correct answer is: B. Spam

Where does most data go first with in a computer memory hierarchy ?

A. RAM
B. ROM
C. BIOS
D. CACHE
Correct answer is: A. RAM

A DVD is an example of a (n)                        ?

A. hard disk
B. optical disc
C. output device
D. solid-state storage device
Correct answer is: B. optical disc

Which of the following contains permanent data and gets updated during the processing of transactions?

A. Operating System File
B. Transaction file
C. Software File
D. Master file
Correct answer is: D. Master file

Who invented Java programming language ?

A. Deniss
B. Linus
C. James
D. Bajarnae
Correct answer is: C. James

If a computer has more than one processor then it is known as                      ?

A. Uni-process
B. Multiprocessor
C. Multi- threaded
D. Multi- programming
Correct answer is: B. Multiprocessor

Which Operation can’t be performed by Queue?

A. Insertion
B. Deletion
C. Retrieving
D. Traversing
Correct answer is: D. Traversing

Vendor-created program modifications are called                    ?

A. patches
B. fixes
C. antiviruses
D. holes
Correct answer is: A. patches

Scroll to Top