Category Archives: Computer

Computer Science mcqs with answers shall be available here at this page that will help you to pass any exam in 9th Class, 10th Class 1st year, 2nd year, NTS, JTS, PTS, OTS, JTS, GTS, BTS, CTS, Pak Army, Pak Navy, PAF, Police, Rangers And All armed forces, Fpsc, kppsc, ppsc, ajkpsc, ,BPSC, SPSC, CSS, NTS, ETEA, ETS, JTS, MTS, CTS.

A Subset Of A Network That Includes All The Routers But Contains No Loops Is Called?

Question: A Subset Of A Network That Includes All The Routers But Contains No Loops Is Called? a. Spanning tree b. Spider structure c. Spider tree d. None of the mentioned [efaccordion id="01"] [efitems title="Show Answer" text="Spanning tree"][/efaccordion]

Which One Of The Following Algorithm Is Not Used For Congestion Control?

Question: Which One Of The Following Algorithm Is Not Used For Congestion Control? a. Traffic aware routing b. Admission control c. Load shedding d. None of the mentioned [efaccordion id="01"] [efitems title="Show Answer" text="None of the mentioned"][/efaccordion]

The Network Layer Protocol Of Internet Is?

Question: The Network Layer Protocol Of Internet Is? a. Ethernet b. Internet Protocol c. Hypertext transfer protocol d. nNone of the mentioned [efaccordion id="01"] [efitems title="Show Answer" text="Internet Protocol"][/efaccordion]

ICMP Is Primarily Used For?

Question: ICMP Is Primarily Used For? a. error and diagnostic functions b. addressing c. forwarding d. none of the mentioned [efaccordion id="01"] [efitems title="Show Answer" text="error and diagnostic functions"][/efaccordion]

Which Of The Following Is A Form Of Dos Attack?

Question: Which Of The Following Is A Form Of Dos Attack? a. Vulnerability attack b. Bandwidth flooding c. Connection flooding d. All of the mentioned [efaccordion id="01"] [efitems title="Show Answer" text="All of the mentioned"][/efaccordion]

The Dos Attack Is Which The Attacker Establishes A Large Number Of Half-Open Or Fully Open TCP Connections At The Target Host?

Question: The Dos Attack Is Which The Attacker Establishes A Large Number Of Half-Open Or Fully Open TCP Connections At The Target Host? a. Vulnerability attack b. Bandwidth flooding c. Connection flooding d. All of the mentioned [efaccordion id="01"] [efitems title="Show Answer" text="Bandwidth flooding"][/efaccordion]