0% found this document useful (0 votes)
224 views

Computer Network MCQ

This document contains 1000 multiple choice questions about computer networks organized by chapter. The questions cover topics like the definition of a computer network, types of networks like local area networks and wide area networks, network devices like routers and switches, network topologies, and the OSI model layers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
224 views

Computer Network MCQ

This document contains 1000 multiple choice questions about computer networks organized by chapter. The questions cover topics like the definition of a computer network, types of networks like local area networks and wide area networks, network devices like routers and switches, network topologies, and the OSI model layers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 42

Computer Network MCQ (Multiple Choice Questions)

Here are 1000 MCQs on Computer Network (Chapterwise).


1. What is a computer network?
a) A device used to display information on a computer screen
b) A collection of interconnected computers and devices that can communicate and share
resources
c) A type of software used to create documents and presentations
d) The physical casing that protects a computer’s internal components
View Answer
Answer: b
Explanation: A computer network refers to a collection of computers and devices linked together
to share information, resources, and services. This interconnection enables communication, data
sharing, and collaboration among the devices within the network.
2. What is internet?
a) A network of interconnected local area networks
b) A collection of unrelated computers
c) Interconnection of wide area networks
d) A single network
View Answer
Answer: c
Explanation: The internet is a global network formed by connecting wide area networks (WANs),
enabling worldwide communication and data sharing.
3. Which of the following is an example of Bluetooth?
a) wide area network
b) virtual private network
c) local area network
d) personal area network
View Answer
Answer: d
Explanation: Bluetooth is a wireless technology used to create a wireless personal area network
for data transfer up to a distance of 10 meters. It operates on 2.45 GHz frequency band for
transmission.
4. Which of the following computer networks is built on the top of another network?
a) overlay network
b) prime network
c) prior network
d) chief network
View Answer
Answer: a
Explanation: An overlay network is a computer network that is built on top of another network.
Some examples of an overlay network are Virtual Private Networks (VPN) and Peer-to-Peer
Networks (P2P).
5. What is the full form of OSI?
a) optical service implementation
b) open service Internet
c) open system interconnection
d) operating system interface
View Answer
Answer: c
Explanation: OSI is the abbreviation for Open System Interconnection. OSI model provides a
structured plan on how applications communicate over a network, which also helps us to have a
structured plan for troubleshooting. It is recognized by the ISO as the generalized model for
computer network i.e. it can be modified to design any kind of computer network.
advertisement
6. When a collection of various computers appears as a single coherent system to its clients,
what is this called?
a) mail system
b) networking system
c) computer network
d) distributed system
View Answer
Answer: d
Explanation: A Computer network is defined as a collection of interconnected computers which
uses a single technology for connection.
A distributed system is also the same as computer network but the main difference is that the
whole collection of computers appears to its users as a single coherent system.
Example:- World wide web
7. How many layers are there in the ISO OSI reference model?
a) 7
b) 5
c) 4
d) 6
View Answer
Answer: a
Explanation: The seven layers in ISO OSI reference model is Application, Presentation, Session,
Transport, Network, Data link and Physical layer. OSI stands for Open System Interconnect and
it is a generalized model.
8. What are nodes in a computer network?
a) the computer that routes the data
b) the computer that terminates the data
c) the computer that originates the data
d) all of the mentioned
View Answer
Answer: d
Explanation: In a computer network, a node can be anything that is capable of sending data or
receiving data or even routing the data to its destination. Routers, Computers and Smartphones
are some examples of network nodes.
9. Which one of the following is not a function of network layer?
a) congestion control
b) error control
c) routing
d) inter-networking
View Answer
Answer: b
Explanation: In the OSI model, network layer is the third layer and it provides data routing
paths for network communications. Error control is a function of the data link layer and the
transport layer.
10. How is a single channel shared by multiple signals in a computer network?
a) multiplexing
b) phase modulation
c) analog modulation
d) digital modulation
View Answer
Answer: a
Explanation: In communication and computer networks, the main goal is to share a scarce
resource. This is done by multiplexing, where multiple analog or digital signals are combined
into one signal over a shared medium. The multiple kinds of signals are designated by the
transport layer which is the layer present on a higher level than the physical layer.
11. Which of the following devices forwards packets between networks by processing the routing
information included in the packet?
a) firewall
b) bridge
c) hub
d) router
View Answer
Answer: d
Explanation: A router is a networking device that forwards data packets between computer
networks. Routers perform the traffic directing functions on the Internet. They make use of
routing protocols like RIP to find the cheapest path to the destination.
12. What is the term for an endpoint of an inter-process communication flow across a computer
network?
a) port
b) machine
c) socket
d) pipe
View Answer
Answer: c
Explanation: Socket is one end point in a two way communication link in the network. TCP layer
can identify the application that data is destined to be sent by using the port number that is
bound to socket.
13. How do two devices become part of a network?
a) PIDs of the processes running of different devices are same
b) a process in one device is able to exchange information with a process in another device
c) a process is active and another is inactive
d) a process is running on both devices
View Answer
Answer: b
Explanation: A computer network, or data network, is a digital telecommunications network
which allows nodes to share resources. In computer networks, computing devices exchange data
with each other using connections between nodes. The nodes have certain processes which
enable them to share a specific type of data using a distinct protocol.
14. Which layer does the data link layer take packets from and encapsulate them into frames for
transmission?
a) transport layer
b) application layer
c) network layer
d) physical layer
View Answer
Answer: c
Explanation: In computer networks, the data from application layer is sent to transport layer
and is converted to segments. These segments are then transferred to the network layer and these
are called packets. These packets are then sent to data link layer where they are encapsulated
into frames. These frames are then transferred to physical layer where the frames are converted
to bits. Error control and flow control data is inserted in the frames at the data link layer.
15. Which of this is not a network edge device?
a) Switch
b) PC
c) Smartphones
d) Servers
View Answer
Answer: a
Explanation: Network edge devices refer to host systems, which can host applications like web
browser. A switch can’t operate as a host, but as a central device which can be used to manage
network communication.
16. Which type of network shares the communication channel among all the machines?
a) anycast network
b) multicast network
c) unicast network
d) broadcast network
View Answer
Answer: d
Explanation: In a broadcast network, information is sent to all stations in a network whereas in
a multicast network the data or information is sent to a group of stations in the network. In
unicast network, information is sent to only one specific station. The broadcast address of the
network is the last assigned address of the network.
17. Which topology requires a multipoint connection?
a) Ring
b) Bus
c) Star
d) Mesh
View Answer
Answer: b
Explanation: In bus topology, there is a single cable to which all the network nodes are
connected. So whenever a node tries to send a message or data to other nodes, this data passes
through all other nodes in the network through the cable. It is really simple to install but it’s not
secure enough to be used in most of the computer network applications.
18. Which of the following maintains the Domain Name System?
a) a single server
b) a single computer
c) distributed database system
d) none of the mentioned
View Answer
Answer: c
Explanation: A domain name system is maintained by a distributed database system. It is a
collection of multiple, logically interrelated databases distributed over a computer network.
19. When discussing IDS/IPS, what is a signature?
a) It refers to “normal,” baseline network behavior
b) It is used to authorize the users on a network
c) An electronic signature used to authenticate the identity of a user on the network
d) Attack-definition file
View Answer
Answer: d
Explanation: IDSes work in a manner similar to modern antivirus technology. They are
constantly updated with attack-definition files (signatures) that describe each type of known
malicious activity. Nemean is a popular signature generation method for conventional computer
networks.
20. Which of the following are Gigabit Ethernets?
a) 1000 BASE-LX
b) 1000 BASE-CX
c) 1000 BASE-SX
d) All of the mentioned
View Answer
Answer: d
Explanation: In computer networking, Gigabit Ethernet (GbE or 1 GigE) is a term describing
various technologies for transmitting Ethernet frames at a rate of a gigabit per second
(1,000,000,000 bits per second), as defined by the IEEE 802.3-2008 standard. It came into use
beginning in 1999, gradually supplanting Fast Ethernet in wired local networks, as a result of
being considerably faster.
21. Which of the following networks extends a private network across public networks?
a) virtual private network
b) local area network
c) storage area network
d) enterprise private network
View Answer
Answer: a
Explanation: A virtual private network extends a private network across a public network, and
enables users to send and receive data across shared or public networks as if their computing
devices were directly connected to the private network.VPN provides enhanced security and
online anonymity to users on the internet. It is also used to unblock websites which are
unavailable in certain regions.
22. Which layer is responsible for process to process delivery in a general network model?
a) session layer
b) data link layer
c) transport layer
d) network layer
View Answer
Answer: c
Explanation: The role of Transport layer (Layer 4) is to establish a logical end to end connection
between two systems in a network. The protocols used in Transport layer is TCP and UDP. The
transport layer is responsible for segmentation of the data. It uses ports for the implementation
of process-to-process delivery.
23. What does each packet contain in a virtual circuit network?
a) only source address
b) only destination address
c) full source and destination address
d) a short VC number
View Answer
24. What is the term for the data communication system within a building or campus?
a) MAN
b) LAN
c) PAN
d) WAN
View Answer
Answer: b
Explanation: LAN is an abbreviation for Local Area Network. This network interconnects
computers in a small area such as schools, offices, residence etc. It is the most versatile kind of
data communication system where most of the computer network concepts can be visibly used.
25. What was the name of the first network?
a) ASAPNET
b) ARPANET
c) CNNET
d) NSFNET
View Answer
Answer: b
Explanation: ARPANET stands for Advanced Research Projects Agency Networks. It was the
first network to be implemented which used the TCP/IP protocol in the year 1969.
26. Which of the following is the network layer protocol for the internet?
a) hypertext transfer protocol
b) file transfer protocol
c) ethernet
d) internet protocol
View Answer
Answer: d
Explanation: There are several protocols used in Network layer. Some of them are IP, ICMP,
CLNP, ARP, IPX, HRSP etc. Hypertext transfer protocol is for application layer and ethernet
protocol is for data link layer.
27. Which network topology requires a central controller or hub?
a) Ring
b) Bus
c) Star
d) Mesh
View Answer
Answer: c
Explanation: In star topology, no computer is connected to another computer directly but all the
computers are connected to a central hub. Every message sent from a source computer goes
through the hub and the hub then forwards the message only to the intended destination
computer.
28. If a link transmits 4000 frames per second, and each slot has 8 bits, what is the transmission
rate of the circuit using Time Division Multiplexing (TDM)?
a) 500kbps
b) 32kbps
c) 32bps
d) 500bps
View Answer
Answer: b
Explanation: Transmission rate= frame rate * number of bits in a slot.
Given: Frame rate = 4000/sec and number of bits in slot = 8
Thus, Transmission rate = (4000 * 8) bps
= 32000bps
= 32kbps
29. Which of the following allows LAN users to share computer programs and data?
a) File server
b) Network
c) Communication server
d) Print server
View Answer
Answer: a
Explanation: A file server allows LAN users to share computer programs and data. It uses the
File Transfer Protocol to provide this feature on ports 20 and 21. The file server works as a
medium for the transfer.
30. What type of transmission is involved in communication between a computer and a
keyboard?
a) Half-duplex
b) Full-duplex
c) Simplex
d) Automatic
View Answer
Answer: c
Explanation: In simplex transmission, data flows in single direction which in this case refers to
the data flowing from the keyboard to the computer. Another example would be of the mouse
where the data flows from the mouse to the computer only.
31. Which layer provides the services to user?
a) physical layer
b) presentation layer
c) session layer
d) application layer
View Answer
Answer: d
Explanation: In networking, a user mainly interacts with application layer to create and send
information to other computer or network. Application layer provides the interface between
applications and the network. It is the top-most layer in both the TCP/IP and the OSI model.
32. Which connection is necessary for a computer to join the internet?
a) internet society
b) internet service provider
c) different computer
d) internet architecture board
View Answer
Answer: b
Explanation: The ISPs (Internet Service Providers) are the main agents through which every
computer is connected to the internet. They are licensed to allot public IP addresses to its
customers in order to connect them to the internet.
33. Which of the following allows you to connect and login to a remote computer?
a) SMTP
b) HTTP
c) FTP
d) Telnet
View Answer
Answer: d
Explanation: Telnet provides access to the command-line interface on a remote computer. One
can login to the computer from the command-line interface.
34. Which of the following is used in an attempt to render a computer resource unavailable to its
intended users?
a) botnet process
b) worms attack
c) virus attack
d) denial-of-service attack
View Answer
Answer: d
Explanation: In a Denial of Service attack, the attacker won’t let the victims access the network
by using a certain method that ensures that an essential network resource is unavailable to the
victim. The methods that the attacker can use are vulnerability attack, bandwidth flooding and
connection flooding.
Operating System MCQ (Multiple Choice Questions)
Here are 1000 MCQs on Operating System (Chapterwise).
1. What is an operating system?
a) interface between the hardware and application programs
b) collection of programs that manages hardware resources
c) system service provider to the application programs
d) all of the mentioned
View Answer
Answer: d
Explanation: An Operating System acts as an intermediary between user/user
applications/application programs and hardware. It is a program that manages hardware
resources. It provides services to application programs.
2. What is the main function of the command interpreter?
a) to provide the interface between the API and application program
b) to handle the files in the operating system
c) to get and execute the next user-specified command
d) none of the mentioned
View Answer
Answer: c
Explanation: The main function of a command interpreter is to get and execute the next user-
specified command. Command Interpreter checks for valid command and then runs that
command else it will throw an error.
3. In Operating Systems, which of the following is/are CPU scheduling algorithms?
a) Priority
b) Round Robin
c) Shortest Job First
d) All of the mentioned
View Answer
Answer: d
Explanation: In Operating Systems, CPU scheduling algorithms are:
i) First Come First Served scheduling
ii) Shortest Job First scheduling
iii) Priority scheduling
iv) Round Robin scheduling
v) Multilevel Queue scheduling
vi) Multilevel Feedback Queue scheduling
All of these scheduling algorithms have their own advantages and disadvantages.
4. To access the services of the operating system, the interface is provided by the ___________
a) Library
b) System calls
c) Assembly instructions
d) API
View Answer
Answer: b
Explanation: To access services of the Operating System an interface is provided by the System
Calls. Generally, these are functions written in C and C++. Open, Close, Read, Write are some
of most prominently used system calls.
5. CPU scheduling is the basis of ___________
a) multiprogramming operating systems
b) larger memory sized systems
c) multiprocessor systems
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
advertisement
6. Which one of the following is not true?
a) kernel remains in the memory during the entire computer session
b) kernel is made of various modules which can not be loaded in running operating system
c) kernel is the first part of the operating system to load into memory during booting
d) kernel is the program that constitutes the central core of the operating system
View Answer
Answer: b
Explanation: Kernel is the first program that is loaded in memory when OS is loading as well as
it remains in memory till OS is running. Kernel is the core part of the OS which is responsible
for managing resources, allowing multiple processes to use the resources and provide services to
various processes. Kernel modules can be loaded and unloaded in run-time i.e. in running OS.
7. Which one of the following errors will be handle by the operating system?
a) lack of paper in printer
b) connection failure in the network
c) power failure
d) all of the mentioned
View Answer
Answer: d
Explanation: All the mentioned errors are handled by OS. The OS is continuously monitoring all
of its resources. Also, the OS is constantly detecting and correcting errors.
8. Where is the operating system placed in the memory?
a) either low or high memory (depending on the location of interrupt vector)
b) in the low memory
c) in the high memory
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
9. If a process fails, most operating system write the error information to a ______
a) new file
b) another running process
c) log file
d) none of the mentioned
View Answer
Answer: c
Explanation: If a process fails, most operating systems write the error information to a log file.
Log file is examined by the debugger, to find out what is the actual cause of that particular
problem. Log file is useful for system programmers for correcting errors.
10. Which one of the following is not a real time operating system?
a) RTLinux
b) Palm OS
c) QNX
d) VxWorks
View Answer
Answer: b
Explanation: VxWorks, QNX & RTLinux are real-time operating systems. Palm OS is a mobile
operating system. Palm OS is developed for Personal Digital Assistants (PDAs).
11. What does OS X has?
a) monolithic kernel with modules
b) microkernel
c) monolithic kernel
d) hybrid kernel
View Answer
Answer: d
Explanation: OS X has a hybrid kernel. Hybrid kernel is a combination of two different kernels.
OS X is developed by Apple and originally it is known as Mac OS X.
12. In operating system, each process has its own __________
a) open files
b) pending alarms, signals, and signal handlers
c) address space and global variables
d) all of the mentioned
View Answer
Answer: d
Explanation: In Operating Systems, each process has its own address space which contains
code, data, stack, and heap segments or sections. Each process also has a list of files that is
opened by the process as well as all pending alarms, signals, and various signal handlers.
13. In a timeshare operating system, when the time slot assigned to a process is completed, the
process switches from the current state to?
a) Suspended state
b) Terminated state
c) Ready state
d) Blocked state
View Answer
Answer: c
Explanation: In a time-sharing operating system, when the time slot given to a process is
completed, the process goes from the running state to the Ready State. In a time-sharing
operating system, unit time is defined for sharing CPU, it is called a time quantum or time slice.
If a process takes less than 1 time quantum, then the process itself releases the CPU.
14. Cascading termination refers to the termination of all child processes if the parent process
terminates ______
a) Normally or abnormally
b) Abnormally
c) Normally
d) None of the mentioned
View Answer
Answer: a
Explanation: Cascading termination refers to the termination of all child processes if the parent
process terminates Normally or Abnormally. Some systems don’t allow child processes to exist if
the parent process has terminated. Cascading termination is normally initiated by the operating
system.
15. When a process is in a “Blocked” state waiting for some I/O service. When the service is
completed, it goes to the __________
a) Terminated state
b) Suspended state
c) Running state
d) Ready state
View Answer
Answer: d
Explanation: Suppose that a process is in “Blocked” state waiting for some I/O service. When
the service is completed, it goes to the ready state. Process never goes directly to the running
state from the waiting state. Only processes which are in ready state go to the running state
whenever CPU allocated by operating system.
16. Transient operating system code is a code that ____________
a) stays in the memory always
b) never enters the memory space
c) comes and goes as needed
d) is not easily accessible
View Answer
Answer: c
Explanation: None.
17. The portion of the process scheduler in an operating system that dispatches processes is
concerned with ____________
a) assigning ready processes to waiting queue
b) assigning running processes to blocked queue
c) assigning ready processes to CPU
d) all of the mentioned
View Answer
Answer: c
Explanation: None.
18. The FCFS algorithm is particularly troublesome for ____________
a) operating systems
b) multiprocessor systems
c) time sharing systems
d) multiprogramming systems
View Answer
Answer: c
Explanation: In a time sharing system, each user needs to get a share of the CPU at regular
intervals.
19. For an effective operating system, when to check for deadlock?
a) every time a resource request is made at fixed time intervals
b) at fixed time intervals
c) every time a resource request is made
d) none of the mentioned
View Answer
Answer: a
Explanation: In an effective operating system, we must verify the deadlock each time a request
for resources is made at fixed time intervals.
20. A deadlock avoidance algorithm dynamically examines the __________ to ensure that a
circular wait condition can never exist.
a) operating system
b) resources
c) system storage state
d) resource allocation state
View Answer
Answer: d
Explanation: Resource allocation states are used to maintain the availability of the already and
current available resources.
21. Swapping _______ be done when a process has pending I/O, or has to execute I/O
operations only into operating system buffers.
a) must never
b) maybe
c) can
d) must
View Answer
Answer: a
Explanation: None.
22. The main memory accommodates ____________
a) cpu
b) user processes
c) operating system
d) all of the mentioned
View Answer
Answer: c
Explanation: None.
23. The operating system is responsible for?
a) bad-block recovery
b) booting from disk
c) disk initialization
d) all of the mentioned
View Answer
Answer: d
Explanation: None.
24. The operating system and the other processes are protected from being modified by an
already running process because ____________
a) every address generated by the CPU is being checked against the relocation and limit
registers
b) they have a protection algorithm
c) they are in different memory spaces
d) they are in different logical addresses
View Answer
Answer: a
Explanation: None.
25. Using transient code, _______ the size of the operating system during program execution.
a) maintains
b) changes
c) increases
d) decreases
View Answer
Answer: b
Explanation: None.
26. The operating system maintains a ______ table that keeps track of how many frames have
been allocated, how many are there, and how many are available.
a) memory
b) mapping
c) page
d) frame
View Answer
Answer: d
Explanation: None.
27. To obtain better memory utilization, dynamic loading is used. With dynamic loading, a
routine is not loaded until it is called. For implementing dynamic loading ____________
a) special support from operating system is essential
b) special support from hardware is required
c) user programs can implement dynamic loading without any special support from hardware or
operating system
d) special support from both hardware and operating system is essential
View Answer
Answer: c
Explanation: None.
28. The _________ presents a uniform device-access interface to the I/O subsystem, much as
system calls provide a standard interface between the application and the operating system.
a) Device drivers
b) I/O systems
c) Devices
d) Buses
View Answer
Answer: a
Explanation: None.
29. In real time operating system ____________
a) process scheduling can be done only once
b) all processes have the same priority
c) kernel is not required
d) a task must be serviced by its deadline period
View Answer
Answer: d
Explanation: None.
30. Hard real time operating system has ______________ jitter than a soft real time operating
system.
a) equal
b) more
c) less
d) none of the mentioned
View Answer
Answer: c
Explanation: Jitter is the undesired deviation from the true periodicity.
31. For real time operating systems, interrupt latency should be ____________
a) zero
b) minimal
c) maximum
d) dependent on the scheduling
View Answer
Answer: b
Explanation: Interrupt latency is the time duration between the generation of interrupt and
execution of its service.
32. Which one of the following is a real time operating system?
a) Windows CE
b) RTLinux
c) VxWorks
d) All of the mentioned
View Answer
33. The priority of a process will ______________ if the scheduler assigns it a static priority.
a) depends on the operating system
b) change
c) remain unchanged
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
34. What are the characteristics of Host based IDS?
a) Logs are analysed to detect tails of intrusion
b) The host operating system logs in the audit information
c) Logs includes logins, file opens, and program executions
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
35. What are the characteristics of stack based IDS?
a) It is programmed to interpret a certain series of packets
b) It models the normal usage of the network as a noise characterization
c) They are integrated closely with the TCP/IP stack and watch packets
d) The host operating system logs in the audit information
View Answer
Answer: c
Explanation: None.
36. If the sum of the working – set sizes increases, exceeding the total number of available
frames ____________
a) the operating system selects a process to suspend
b) the system crashes
c) then the process crashes
d) the memory overflows
View Answer
Answer: a
Explanation: None.
37. The information about all files is kept in ____________
a) operating system
b) separate directory structure
c) swap space
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
38. The operating system keeps a small table containing information about all open files called
____________
a) file table
b) directory table
c) open-file table
d) system table
View Answer
Answer: c
Explanation: None.
39. What will happen in the single level directory?
a) All files are contained in the same directory
b) All files are contained in different directories all at the same level
c) Depends on the operating system
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
40. The operating system _______ the links when traversing directory trees, to preserve the
acyclic structure of the system.
a) deletes
b) considers
c) ignores
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
41. To recover from failures in the network operations _____________ information may be
maintained.
a) operating system
b) ip address
c) stateless
d) state
View Answer
Answer: d
Explanation: None.
42. On systems where there are multiple operating system, the decision to load a particular one
is done by _____________
a) process control block
b) file control block
c) boot loader
d) bootstrap
View Answer
Answer: c
Explanation: None.
43. Whenever a process needs I/O to or from a disk it issues a ______________
a) system call to the operating system
b) a special procedure
c) system call to the CPU
d) all of the mentioned
View Answer
Answer: a
Explanation: None.
44. The two steps the operating system takes to use a disk to hold its files are _______ and
________
a) caching & logical formatting
b) logical formatting & swap space creation
c) swap space creation & caching
d) partitioning & logical formatting
View Answer
Answer: d
Explanation: None.
45. The _______ program initializes all aspects of the system, from CPU registers to device
controllers and the contents of main memory, and then starts the operating system.
a) bootstrap
b) main
c) bootloader
d) rom
View Answer
Answer: a
Explanation: None.
46. In SCSI disks used in high end PCs, the controller maintains a list of _________ on the disk.
The disk is initialized during ________ formatting which sets aside spare sectors not visible to
the operating system.
a) destroyed blocks, partitioning
b) bad blocks, low level formatting
c) destroyed blocks, high level formatting
d) bad blocks, partitioning
View Answer
Answer: b
Explanation: None.
47. Which principle states that programs, users, and even the systems be given just enough
privileges to perform their task?
a) principle of least privilege
b) principle of process scheduling
c) principle of operating system
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
48. Network operating system runs on ___________
a) every system in the network
b) server
c) both server and every system in the network
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
49. What are the types of distributed operating systems?
a) Zone based Operating system
b) Level based Operating system
c) Network Operating system
d) All of the mentioned
View Answer
Answer: c
Explanation: None.
50. In Unix, which system call creates the new process?
a) create
b) fork
c) new
d) none of the mentioned
View Answer
Answer: b
Explanation: In UNIX, a new process is created by fork() system call. fork() system call returns a
process ID which is generally the process id of the child process created.
Web Technology MCQ (Multiple Choice Questions)
Here are 1000 Web Technology MCQ (Chapterwise).
1. What is web technology?
a) A collection of tools and techniques used to create and deliver content on the World Wide
Web
b) A type of software that enables users to access and interact with information on the internet
c) A network of interconnected computers that share information and services
d) A system for storing and retrieving information on the internet
View Answer
Answer: a
Explanation: Web technology is a term that encompasses the tools, techniques, and standards
used to create and deliver content on the World Wide Web. This includes markup languages like
HTML and CSS, scripting languages like JavaScript, client-side technologies like HTML5 and
CSS3, server-side technologies like PHP and Java, databases, networking protocols, and more.
2. Which HTML tag is used to create a hyperlink?
a) <link>
b) <href>
c) <a>
d) <hyperlink>
View Answer
Answer: c
Explanation: The HTML tag <a> is used to create a hyperlink, which is a link to another web
page or resource. The <a> tag has two main attributes: href and target. The href attribute
specifies the URL of the linked resource, while the target attribute specifies whether the link
should open in a new browser window or tab.
3. Which of the following is not a web component element?
a) <shadow>
b) <menu>
c) <content>
d) <element>
View Answer
Answer: b
Explanation: There are web components in HTML related technology which makes it possible to
essentially create and use custom elements as if it were regular HTML. You can also create
custom versions of standard HTML elements. Some of the elements are <shadow>, <content>,
<element>, <template>, <slot>.
advertisement
4. Which of the following programming languages is commonly used for server-side scripting in
web development?
a) HTML
b) CSS
c) JavaScript
d) PHP
View Answer
Answer: d
Explanation: HTML, CSS, and JavaScript play crucial roles in front-end development, focusing
on the visual aspects of web pages, while PHP serves as the primary language for server-side
scripting. It manages backend tasks such as database interactions, processing user input, and
generating dynamic content.
5. Which of the following is used to read a HTML page and render it?
a) Web server
b) Web matrix
c) Web browser
d) None of the mentioned
View Answer
Answer: c
Explanation: A web browser (commonly referred to as a browser) is a software application for
retrieving, presenting and traversing information resources on the World Wide Web.
6. Which of the following is a popular front-end framework for building user interfaces in
JavaScript?
a) Django
b) Angular
c) Flask
d) Node.js
View Answer
7. What application can one create even before the introduction of HTML5?
a) Forms
b) Browser based games
c) Web applications
d) Mobile applications
View Answer
Answer: a
Explanation: With the help of HTML5 and JavaScript it became possible to create excellent
mobile applications, browser based games, web applications and many more other applications.
Forms were already introduced before HTML5.
8. Which of the following is not associated with web socket communication?
a) https
b) wss
c) http
d) ws
View Answer
9. Why are Images often used on the webpage?
a) To create graphical buttons or links to other pages
b) To help the webpage load efficiently
c) Webpage cannot run/be displayed without at least one image
d) Because webpage doesn’t support pure text
View Answer
10. What is DOM?
a) Application programming interface
b) Hierarchy of objects in ASP.NET
c) Convention for representing and interacting with objects in html documents
d) None of the mentioned
View Answer
Answer: c
Explanation: The Document Object Model (DOM) is a cross-platform and language-independent
convention for representing and interacting with objects in HTML, XHTML, and XML
documents.
11. What are tables in web programming?
a) Display information which are already accessed by the user
b) Containing more number of rows than columns
c) To only store data to be accessed later by the user
d) Display information in rows and columns used to display all manner of data that fits in a grid
View Answer
Answer: d
Explanation: Tables display information in rows and columns; they are commonly used to
display all manner of data that fits in a grid such as train schedules, television listings, financial
reports, and sports results.
12. What does <td> stand for?
a) Table database
b) Table data
c) Table directory
d) Table direct row
View Answer
Answer: b
Explanation: While a row is contained inside a < tr > element, each cell is then written inside
the row element using a < td > element which stands for table data. If you are looking at a web
page and want to know whether that page is using a table to control how the data is laid out, you
can always look at the source for that page.
13. Which element to used to give title to a table?
a) Caption
b) Headline
c) Title
d) Heading
View Answer
Answer: a
Explanation: By using a <caption> element, rather than just describing the purpose of the table
in a previous or subsequent paragraph, you are directly associating the content of the table with
this description- and this association can be used by screen readers and by applications that
process web pages (such as search engines).
14. What are Forms in web programming?
a) They are matrices on web page
b) They are used to create Table data and its information
c) They allow you to enter data which can be processed to servers
d) They are the information filled by the server-side
View Answer
Answer: c
Explanation: Forms can look a lot like papers or database forms. A form is filled using text
boxes, chechboxes, radiobuttons. For example, applying/order a product from online or it’s a
google search result.
15. What are Frames?
a) They divide a webpage
b) They are the type of borders used for a webpage
c) They are the type of borders used by web browsers
d) They divide the browser into two or more pieces or panes
View Answer
Answer: d
Explanation: Browser gets divided into panes by Frame, with each pane containing a separate
web page. The advantages are that they offer you where you can load and reload single panes
without having to reload the entire contents of the browser window.
16. Which HTML tag is used to create an ordered list in a webpage?
a) <ol>
b) <ul>
c) <li>
d) <ol> and <ul>
View Answer
Answer: a
Explanation: The <ol> tag is used to create an ordered list in a webpage. Ordered lists are lists
where the items have a specific order or sequence. The items in an ordered list are typically
numbered or lettered.
17. Which font format is used in web pages?
a) EOT
b) WOFF 2.0
c) WOFF
d) SVG Fonts
View Answer
Answer: c
Explanation: WOFF is font format used in web pages. It was developed in 2009. It is essentially
OpenType or TrueType with compression and additional metadata. The goal is to support font
distribution from the server to client over the network with bandwidth constraints.
18. Which HTML tag is used to create a form?
a) <form>
b) <input>
c) <select>
d) <textarea>
View Answer
Answer: a
Explanation: The HTML tag used to create a form is <form>. It’s used to define an area where
users can input and submit data on a webpage. Inside the <form> tag, various input elements
like <input>, <select>, and <textarea> are used to collect information from users. When users
fill in the form and submit it, the data is sent to a server for processing or storage.
19. Which of the following property is used to control the space between the border and content
in a table?
a) border
b) padding
c) margin
d) resize
View Answer
Answer: b
Explanation: The padding property is used to control the space between the border and content
in a table.
Example: table{border: 4px solid black;}
20. Which of the following CSS Property controls how an element is positioned?
a) fix
b) set
c) static
d) position
View Answer
Answer: d
Explanation: Controls how an element is positioned. When set to absolute or fixed, the element is
removed completely from the normal flow of the document. When set to relative, the element is
moved relative to its position in the normal flow, but a space is left where it would normally have
been. The default value, static, means the element remains in the normal flow and is not
positioned.
21. Which CSS property can be used to set the image as border instead of the border style?
a) border-image-source
b) background-image-source
c) border-image
d) background-image
View Answer
Answer: a
Explanation: The border-image-source property specifies the path to the image to be used as a
border (instead of the normal border around an element).
22. Which of the following property defines labels for a list of items?
a) list-style-type
b) list-style-image
c) list-stylelist-style-type
d) none of the mentioned
View Answer
Answer: a
Explanation: Syntax:
list-style-type: disc | circle | square | decimal | decimal-leading-zero
23. Which of the following communicates with server-side CGI scripts through HTML form
submissions and can be written without the use of JavaScript?
a) Interactive Web Pages
b) Static Web Pages
c) Conditional Web Pages
d) All web pages
View Answer
Answer: a
Explanation: An interactive web page can dynamically vary its content based on user
preferences. Interactive web pages that communicate with server-side CGI scripts through
HTML form submissions were the original “web application” and can be written without the use
of JavaScript.
24. What is the special feature of modern web applications?
a) Must load the document to manipulate
b) Can alter contents without loading document
c) Can’t be altered at all
d) Remains static
View Answer
Answer: b
Explanation: Modern web applications can dynamically alter their own content without loading
a new document.
25. Which of the following is the Web application equivalent to querySelectorAll()?
a) #()
b) &()
c) !()
d) $()
View Answer
Answer: d
Explanation: Web applications based on jQuery use a portable, cross-browser equivalent
to querySelectorAll() named $().
26. Which is the storage that allows the caching of web pages and their associated resources?
a) Offline Web Applications
b) Cookies
c) Web Databases
d) FileSystem API
View Answer
Answer: a
Explanation: HTML5 defines an “Offline Web Applications” API that allows the caching of web
pages and their associated resources (scripts, CSS files, images, and so on). This is client-side
storage for web applications themselves rather than just their data, and it allows web apps to
install themselves so that they are available even when there is no connection to the Internet.
27. When does JavaScript code appear inline within an HTML file?
a) Between or Outside the “script” tag
b) Between the header tag
c) Outside the “script” tag
d) Between the “script” tag
View Answer
Answer: d
Explanation: JavaScript code can appear inline within an HTML file between the “script” tags.
Javascript can also be included from an external file specified by the src attribute of a “script”
tag.
28. What is the purpose of the event handlers in the JavaScript?
a) Adds innerHTML page to the code
b) Allows JavaScript code to alter the behaviour of windows
c) Performs handling of exceptions and occurrences
d) Change the server location
View Answer
Answer: b
Explanation: Event handlers allow JavaScript code to alter the behavior of windows, of
documents, and of the elements that make up those documents.
29. What is Vue JS?
a) Scripting Language
b) A framework
c) Programming Language
d) Directives
View Answer
Answer: b
Explanation: Vue.js is an open-source front-end JavaScript framework for building user
interfaces and single-page applications.
30. Which of the following bootstrap styles can be used to create a default progress bar?
a) .progress, .progress-bar
b) .link-progress-bar
c) .nav-progress
d) All of the mentioned
View Answer
Answer: a
Explanation: A progress bar can be used to display how far along in a process a user is.
Progress bars are available in a variety of styles in Bootstrap. To create a default progress bar,
add a .progress class to a <div> element
31. What is the purpose of JavaScript in web development?
a) To define the structure and content of web pages
b) To add interactivity and behavior to web pages
c) To style and format web pages
d) To manage server-side data and databases
View Answer
Answer: b
Explanation: JavaScript is a scripting language that adds interactivity and behavior to web
pages. It makes web pages more dynamic, responsive, and engaging by handling user input,
updating content dynamically, creating animations, and communicating with servers.
32. React.js is written in which of the following language?
a) C++
b) C
c) Java
d) JavaScript
View Answer
Answer: d
Explanation: React Native is built on a JavaScript based React.js framework. This is a
significant benefit, given that JavaScript is such a widely used language.
33. Which of the following directives is used to start an angularJS application?
a) ng-app
b) ng-init
c) ng-repeat
d) ng-model
View Answer
Answer: a
Explanation: Dependencies are injected in Angular.JS by using an “injectable factory method”
or “constructor function.” As dependencies, these components can be injected with “service”
and “value” components.
34. How many classes does bootstrap grid system has?
a) 2
b) 3
c) 4
d) 1
View Answer
Answer: c
Explanation: Bootstrap grid system has four classes. Xs, sm, md, lg. as is for phones having
screens less than 786px wide, sm is for tablets. Screens equal to or greater than 768px, md is for
small laptops, screen equal to or greater than 992px wide, lg is for laptops and desktops,
Screens equal to or greater than 1200px wide.
35. What is the JavaScript keyword used to define a function?
a) var
b) function
c) let
d) const
View Answer
Answer: b
Explanation: The function keyword is used to define a function in JavaScript. Functions are
blocks of code that can be used to perform actions. They can take input parameters and return a
value.
36. Which CSS property is used to specify the width of an element?
a) padding
b) margin
c) height
d) width
View Answer
Answer: d
Explanation: The width CSS property is used to specify the horizontal width of an element. It is a
dimension property, which means that it can be specified in different units, such as pixels, ems,
or percentages.
Computer Fundamental MCQ (Multiple Choice Questions)
Here are 1000 MCQs on Computer Fundamental (Chapterwise).
1. Who is the father of Computers?
a) James Gosling
b) Charles Babbage
c) Dennis Ritchie
d) Bjarne Stroustrup
View Answer
Answer: b
Explanation: Charles Babbage is known as the father of computers. Charles Babbage designed
and built the first mechanical computer and Difference Engine.
2. Which of the following is the correct abbreviation of COMPUTER?
a) Commonly Occupied Machines Used in Technical and Educational Research
b) Commonly Operated Machines Used in Technical and Environmental Research
c) Commonly Oriented Machines Used in Technical and Educational Research
d) Commonly Operated Machines Used in Technical and Educational Research
View Answer
Answer: d
Explanation: The word COMPUTER is an abbreviation for the terms “Commonly Operated
Machines Used in Technical and Educational Research”. The word COMPUTER also relates to
the word COMPUTE which means to calculate. So initially, it was thought that a computer is a
device that is used to perform calculations.
3. Which of the following is the correct definition of Computer?
a) Computer is a machine or device that can be programmed to perform arithmetical or logic
operation sequences automatically
b) Computer understands only binary language which is written in the form of 0s & 1s
c) Computer is a programmable electronic device that stores, retrieves, and processes the data
d) All of the mentioned
View Answer
Answer: d
Explanation: A computer is a machine or device that can be programmed to perform
arithmetical or logic operation sequences automatically. The computer understands only binary
codes (0s & 1s).
4. What is the full form of CPU?
a) Computer Processing Unit
b) Computer Principle Unit
c) Central Processing Unit
d) Control Processing Unit
View Answer
Answer: c
Explanation: CPU stands for Central Processing Unit. CPU is the part of a computer system
that is mainly referred as the brain of the computer.
5. Which of the following language does the computer understand?
a) Computer understands only C Language
b) Computer understands only Assembly Language
c) Computer understands only Binary Language
d) Computer understands only BASIC
View Answer
Answer: c
Explanation: The Computer understands only binary language which is written in the form of 0s
& 1s. A computer can understand assembly language but an assembler is required which convert
the assembly language to binary language. Similarly, for understanding high level languages,
compilers/interpreters are required.
advertisement
6. Which of the following computer language is written in binary codes only?
a) pascal
b) machine language
c) C
d) C#
View Answer
Answer: b
Explanation: Machine Language is written in binary codes only. It can be easily understood by
the computer and is very difficult for us to understand. A machine language, unlike other
languages, requires no translators or interpreters.
7. Which of the following is the brain of the computer?
a) Central Processing Unit
b) Memory
c) Arithmetic and Logic unit
d) Control unit
View Answer
Answer: a
Explanation: The CPU is referred to as the brain of a computer.
It consists of a control unit and an arithmetic and logic unit. It is responsible for performing all
the processes and operations.
8. Which of the following is not a characteristic of a computer?
a) Versatility
b) Accuracy
c) Diligence
d) I.Q.
View Answer
Answer: d
Explanation: The Computer system has no I.Q. of its own. It does only what it is programmed to
do. It cannot take decisions of its own.
A computer is diligent because it can work continuously for hours without getting any errors or
without getting grumbled.
The accuracy of a computer is consistently high and its level of accuracy depends on its design.
A computer can perform any task if, it can be broken down into a series of logical steps.
Therefore, a computer is versatile.
9. Which of the following is the smallest unit of data in a computer?
a) Bit
b) KB
c) Nibble
d) Byte
View Answer
Answer: a
Explanation: A bit is defined as the smallest unit of data in a computer system. It is used as a
short form of Binary Digit. A bit can have only two values 0 or 1. A nibble comprises 4 bits, a
byte is a collection of 8 bits whereas KB (Kilobyte) is equal to 1024 bytes.
10. Which of the following unit is responsible for converting the data received from the user into
a computer understandable format?
a) Output Unit
b) Input Unit
c) Memory Unit
d) Arithmetic & Logic Unit
View Answer
Answer: b
Explanation: The Input Unit converts the data, which the user enters into a language that the
computer understands, i.e. it converts the data into binary format. The Output Unit is responsible
for giving the results in a user-understandable format. The Storage Unit is responsible for
storing the data after immediate results of processing whereas; the ALU is responsible for
various arithmetic and bitwise operations.
11. Which of the following monitor looks like a television and are normally used with non-
portable computer systems?
a) LED
b) LCD
c) CRT
d) Flat Panel Monitors
View Answer
Answer: c
Explanation: A CRT (or the Cathode Ray Tube) Monitor looks like a television ideally. The flat-
panel monitors are thinner and lighter in comparison.
12. Which of the following is not a type of computer code?
a) EDIC
b) ASCII
c) BCD
d) EBCDIC
View Answer
Answer: a
Explanation: There is no coding scheme like EDIC. EBCDIC stands for Extended Binary Coded
Decimal Interchange Code. BCD stands for Binary Coded Decimal. ASCII stands for American
Standard Code for information interchange.
13. Which of the following part of a processor contains the hardware necessary to perform all
the operations required by a computer?
a) Controller
b) Registers
c) Cache
d) Data path
View Answer
Answer: d
Explanation: A processor is a part of the computer which does all the data manipulation and
decision making. A processor comprises of:
A data path that contains the hardware necessary to perform all the operations. A controller tells
the data path what needs to be done.
The registers act as intermediate storage for the data.
14. Which of the following is designed to control the operations of a computer?
a) User
b) Application Software
c) System Software
d) Utility Software
View Answer
Answer: c
Explanation: Software is basically classified into two: System and application. System Software
is designed to control the operations and extend the processing capability of a computer system.
15. Which of the following device use positional notation to represent a decimal number?
a) Pascaline
b) Abacus
c) Computer
d) Calculator
View Answer
Answer: b
Explanation: Abacus was used to do arithmetic calculations around 2500 years ago. Pascaline
was the pascal’s calculator by Blaise Pascal invented for doing laborious calculations.
16. Which of the following is used in EBCDIC?
a) Super Computers
b) Mainframes
c) Machine Codes
d) Programming
View Answer
Answer: b
Explanation: This concept of EBCDIC was invented by IBM. It is mainly used in the IBM
mainframe environment. So basically, mainframes use EBCDIC codes.
17. Which of the following are physical devices of a computer?
a) Hardware
b) Software
c) System Software
d) Package
View Answer
Answer: a
Explanation: Hardware refers to the physical devices of a computer system. Software refers to a
collection of programs. A program is a sequence of instructions.
18. Which of the following defines the assigned ordering among the characters used by the
computer?
a) Accumulation
b) Sorting
c) Collating Sequence
d) Unicode
View Answer
Answer: c
Explanation: Collating sequence is the term used for ordering among characters. It may vary
depending upon the type of code used by a computer.
19. Which of the following storage is a system where a robotic arm will connect or disconnect
off-line mass storage media according to the computer operating system demands?
a) Magnetic
b) Secondary
c) Virtual
d) Tertiary
View Answer
Answer: d
Explanation: Tertiary storage is the correct option. It is used in the realms of enterprise storage
and scientific computing on large computer systems and business computer networks and is
something a typical personal computer never sees firsthand.
20. Which of the following is known as the interval between the instant a computer makes a
request for the transfer of data from a disk system to the primary storage and the instance the
operation is completed?
a) Disk utilization time
b) Drive utilization time
c) Disk access time
d) Disk arrival time
View Answer
Answer: d
Explanation: The interval is referred to as the disk arrival time. It depends on several
parameters. Generally, a computer makes a request and the operation is served.
21. Which of the following devices provides the communication between a computer and the
outer world?
a) Compact
b) I/O
c) Drivers
d) Storage
View Answer
Answer: b
Explanation: The I/O i.e. the input/output devices provide a means of communication between
the computer and the outer world. They are often referred to as peripheral devices sometimes.
22. Which of the following are the input devices that enable direct data entry into a computer
system from source documents?
a) System Access devices
b) Data acquiring devices
c) Data retrieving devices
d) Data Scanning devices
View Answer
Answer: d
Explanation: They are referred to as data scanning devices. They eliminate the need to key in
text data into the computer. It demands the high quality of input documents.
23. Which of the following is the device used for converting maps, pictures, and drawings into
digital form for storage in computers?
a) Image Scanner
b) Digitizer
c) MICR
d) Scanner
View Answer
Answer: b
Explanation: A digitizer serves the purpose given in the question. Digitizers are generally used
in the area of Computer-Aided Design by architects and engineers to design cars, buildings, etc.
24. Which of the following can access the server?
a) Web Client
b) User
c) Web Browser
d) Web Server
View Answer
Answer: a
Explanation: Any computer that has access to the webserver is called the web client. A web
server is any computer that uses the HTTP protocol.
25. Which of the following is known as the language made up of binary-coded instructions?
a) High level
b) BASIC
c) C
d) Machine
View Answer
Answer: d
Explanation: The language made up of binary-coded instructions built into the hardware of a
particular computer and used directly by the computer is machine language.
26. Which of the following package allows individuals to use personal computers for storing and
retrieving their personal information?
a) Personal assistance package
b) Graphics package
c) Spreadsheet package
d) Animation package
View Answer
Answer: a
Explanation: It is a personal assistance package that allows for the same. It helps in planning
and managing their schedules, contacts, finances, and inventory of important terms.
27. Which of the following is created when a user opens an account in the computer system?
a) SFD
b) MFD
c) Subdirectory
d) RFD
View Answer
Answer: c
Explanation: A subdirectory is created when a user opens an account in the computer system. It
is treated as a file, though flagged in MFD as a subdirectory.
28. Which of the following is a technique that marked the beginning of computer
communications?
a) User Environment
b) Batch Environment
c) Time Sharing
d) Message passing
View Answer
Answer: c
Explanation: The answer is time-sharing. In time-sharing, Users were able to interact with the
computer and could share its information processing resources.
29. Which of the following is a type of technique in which dumb terminals are connected to a
central computer system?
a) Time Sharing
b) Message passing
c) Batch environment
d) User environment
View Answer
Answer: a
Explanation: This happens in time-sharing. In this, users were able to interact with the computer
and could share its information processing resources.
30. Which of the following service allows a user to log in to another computer somewhere on the
Internet?
a) e-mail
b) UseNet
c) Telnet
d) FTP
View Answer
Answer: c
Explanation: Telnet is the answer. It is a service that enables the user to log into another
computer somewhere on the Internet.
31. Which of the following is not a type of computer on the basis of operation?
a) Digital
b) Analog
c) Hybrid
d) Remote
View Answer
32. Which of the following type of computer is mostly used for automatic operations?
a) analog
b) digital
c) hybrid
d) remote
View Answer
Answer: c
Explanation: Hybrid computer is mostly used with automatic operations of complicated physical
processes and machines.
33. Which of the following invention gave birth to the much cheaper microcomputers?
a) PDAs
b) Microprocessors
c) Microcomputers
d) Mainframes
View Answer
Answer: b
Explanation: The invention of the microprocessor (also called a single-chip CPU) gave birth to
much cheaper microcomputers.
34. Which of the following computers are lower than mainframe computers in terms of speed and
storage capacity?
a) Mainframes
b) Hybrid
c) Mini
d) Super
View Answer
Answer: c
Explanation: The answer is a. Mini computers are compared to mainframe computers in terms
of:
1. speed and, 2. storage capacity.
35. Which of the following is the first neural network computer?
a) AN
b) AM
c) RFD
d) SNARC
View Answer
Answer: d
Explanation: SNARC was the first neural network computer. it was built by Minsky and
Edmonds in 1956.
Application System means a collection of Hardware and Software products designed to meet all
of the requirements of a certain market for a specific type of exchange. Application System
means "Software" (as defined below) used for business process management, such as purchase
order management.

What Does Application Server Mean?

An application server is a type of server designed to install, operate and host applications
and associated services for end users, IT services and organizations. It facilitates the
hosting and delivery of high-end consumer or business applications, which are used by
multiple and simultaneously connected local or remote users.

Advertisements

Techopedia Explains Application Server

An application server consists of a server operating system (OS) and server hardware that
work together to provide computing-intensive operations and services to the residing
application. An application server executes and provides user and/or other app access
when utilizing the installed application’s business/functional logic. Key required features
of an application server include data redundancy, high availability, load balancing, user
management, data/application security and a centralized management interface.
Moreover, an application server may be connected by enterprise systems, networks or
intranet and remotely accessed via the Internet.

Depending on the installed application, an application server may be classified in a


variety of ways, including as a Web server, database application server, general purpose
application server or enterprise application (EA) server

You might also like