34
LIST OF ATTEMPTED QUESTIONS AND ANSWERS Select The Blank Question An effective way to analyze the problem is a ________. Correct Answer Flowchart Your Answer Flowchart True/False Question Data can be lost if a transmission error is encountered on a network. Correct Answer True Your Answer True True/False Question VoIP is likely to take over the traditional phone system. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question When a ring topology is configured on a network it usually ? Correct Answer Involves high cost , Complex in nature , Difficult to trouble shoot Your Answer Involves high cost , Complex in nature , Difficult to trouble shoot Multiple Choice Single Answer Question The layout and connection of computers in a network is called: Correct Answer Network Topology Your Answer Network Topology Multiple Choice Single Answer Question Nodes involved in routing process is limited to forwarding data packets based on Correct Answer Internal information Your Answer IP address Select The Blank Question The single interface protocol creates a ________ environment.

Computer Fundamentals & Networking Concepts

Embed Size (px)

Citation preview

Page 1: Computer Fundamentals & Networking Concepts

  LIST OF ATTEMPTED QUESTIONS AND ANSWERS     

 Select The Blank  Question   An effective way to analyze the problem is a ________.

  Correct Answer  Flowchart

  Your Answer   Flowchart

 

 True/False  Question   Data can be lost if a transmission error is encountered on a network.

  Correct Answer  True

  Your Answer   True

 

 True/False  Question   VoIP is likely to take over the traditional phone system.

  Correct Answer  True

  Your Answer   True

 

 Multiple Choice Multiple Answer  Question   When a ring topology is configured on a network it usually ?

  Correct Answer  Involves high cost , Complex in nature , Difficult to trouble shoot

  Your Answer   Involves high cost , Complex in nature , Difficult to trouble shoot

 

 Multiple Choice Single Answer  Question   The layout and connection of computers in a network is called:

  Correct Answer  Network Topology

  Your Answer   Network Topology

 

 Multiple Choice Single Answer  Question   Nodes involved in routing process is limited to forwarding data packets based on

  Correct Answer  Internal information

  Your Answer   IP address

 

 Select The Blank  Question   The single interface protocol creates a ________ environment.

  Correct Answer  User friendly

  Your Answer   Unpredictable

 

 Multiple Choice Multiple Answer  Question   A gateway can be used to interconnect systems with different

 

Page 2: Computer Fundamentals & Networking Concepts

  Correct Answer  Protocols , Languages , Architecture

  Your Answer   Protocols , Languages , Architecture

 

 True/False  Question   In parity checking if external interference introduces an error all the bits will be

changed to zero.  Correct Answer  False

  Your Answer   False

 

 Multiple Choice Multiple Answer  Question   The two type of authentication mechanism available for VPN's are :

  Correct Answer  Password authentication , Digital certificates

  Your Answer   Message authentication code , Password authentication

 

 Multiple Choice Multiple Answer  Question   NAS comes with built-in features such as :

  Correct Answer  Disk space quotas , Error detection , Secure authentication

  Your Answer   Disk space quotas , Error detection , Secure authentication

 

 Select The Blank  Question   Navigation is accomplished by ________ with the mouse on hyperlinks and graphics.

  Correct Answer  Pointing & Clicking

  Your Answer   Pointing & Clicking

 

 True/False  Question   If users connected to the LAN wish to use internet they can use telnet to the gateway

  Correct Answer  True

  Your Answer   True

 

 True/False  Question   The NIC has one or more external ports to which the network cable is attached.

  Correct Answer  True

  Your Answer   True

 

 Multiple Choice Multiple Answer  Question   Which players can be used to play streaming audio and video files ?

  Correct Answer  Windows Media Player , RealPlayer , QuickTime

  Your Answer   Windows Media Player , RealPlayer , QuickTime

 

 Multiple Choice Multiple Answer

Page 3: Computer Fundamentals & Networking Concepts

  Question   A storage area network (SAN) is based on :

  Correct Answer  Fiber channel , Switches , Hub

  Your Answer   Fiber channel , Switches , Hub

 

 Multiple Choice Multiple Answer  Question   Communication devices available for instant compability with desktop computers

specifically for transfer data through :  Correct Answer  Bluetooth , Wi-FI , USB

  Your Answer   USB , Bluetooth , Wi-FI

 

 True/False  Question   Network topology is not concerned with the architecture of the network

  Correct Answer  True

  Your Answer   True

 

 True/False  Question   The Algorithm usually gets complex for programs which are large in size.

  Correct Answer  True

  Your Answer   True

 

 Select The Blank  Question   The ________ integrated circuit pulls millions of transistors into one circuit chip.

  Correct Answer  Monolithic

  Your Answer   Monolithic

 

 Multiple Choice Single Answer  Question   Internet access is usually provided by Internet Service providers, this connectivity or

setup is a network design which is classified under :  Correct Answer  MAN

  Your Answer   MAN

 

 Multiple Choice Single Answer  Question   In an organization where the development of the application softwares is the major

activity, the strategy to develop the complete software adopted using a network is  Correct Answer  Group software development

  Your Answer   Download and Deploy

 

 Select The Blank  Question   A SAN exploits new breeds of ________ technology to get the best out of network

devices.  Correct Answer  Clustering

  Your Answer   Clustering

Page 4: Computer Fundamentals & Networking Concepts

 

 Select The Blank  Question   Possession of ________ grants the right to transmit data to that terminal over a

network.  Correct Answer  Token

  Your Answer   Token

 

 Multiple Choice Single Answer  Question   Which type of jacket is used in shielded twisted pair cable to gurad the wires from

electrical interference ?  Correct Answer  Copper

  Your Answer   Copper

 

 Multiple Choice Single Answer  Question   What is used to measure the sharpness of the monitor display ?

  Correct Answer  Dot pitch

  Your Answer   Resolution

 

 Multiple Choice Multiple Answer  Question   Every flowchart must have proper

  Correct Answer  Start , Process

  Your Answer   Start , Data , Process

 

 Select The Blank  Question   A switch maintains a list of ________ address associated with its ports.

  Correct Answer  MAC

  Your Answer   MAC

 

 True/False  Question   Any station on a token ring network can be the active terminal.

  Correct Answer  True

  Your Answer   False

 

 True/False  Question   Only One flow line should come out from a process in a flowchart.

  Correct Answer  True

  Your Answer   True

 

 Multiple Choice Multiple Answer  Question   What are the common methods of attack on your network ?

  Correct Answer  Network packet sniffers , IP spoofing , Password attack

Page 5: Computer Fundamentals & Networking Concepts

  Your Answer   Network packet sniffers , IP spoofing , Password attack

 

 Match The FollowingQuestion Correct Answer Your Answer

Serial Communication Oneway transfer of data Oneway transfer of data

Protocols Data transmission software Data transmission software

Signals Electronic encoding of data Electronic encoding of data

Transmission Communication of data Communication of data

 

 Multiple Choice Single Answer  Question   OS/2 is a multitasking operating system which was developed by

  Correct Answer  Microsoft and IBM

  Your Answer   HP and IBM

 

 Select The Blank  Question   A computer is used to convert raw data into ________.

  Correct Answer  Information

  Your Answer   Information

 

 Multiple Choice Single Answer  Question   Which protocol is used at the network layer of the OSI layers ?

  Correct Answer  Internet protocol

  Your Answer   Internet protocol

 

 Multiple Choice Multiple Answer  Question   What additional features are present in JavaScript which were not present in HTML.

  Correct Answer  Moving tickers , Drop-down menus , Mouse-over interactions

  Your Answer   Mouse-over interactions

 

 Match The FollowingQuestion Correct Answer Your Answer

A cooking recipe would be Algorithm Algorithm

Graphical Representation of the solution to a problem

Flowchart Flowchart

Set of Logical Statements Algorithm Problem Domain

Program Set of Instructions Set of Instructions

 

 Multiple Choice Single Answer  Question   When the organizations share data on a network, the data is critical in nature and it

should be highly secure, this data security and management is the task of

Page 6: Computer Fundamentals & Networking Concepts

  Correct Answer  Network Administrator

  Your Answer   Network Administrator

 

 Multiple Choice Single Answer  Question   External web pages can be tracked using :

  Correct Answer  Proxy server

  Your Answer   Proxy server

 

 Multiple Choice Multiple Answer  Question   Limitations of VoIP are

  Correct Answer  Latency , Jitter , Packet loss

  Your Answer   Latency , Jitter , Packet loss

 

 Select The Blank  Question   Client generally access a NAS over a ________ connection.

  Correct Answer  Ethernet

  Your Answer   Ethernet

 

 Multiple Choice Single Answer  Question   World wide web (WWW) has its own protocol known as

  Correct Answer  HTTP

  Your Answer   HTTP

 

 Multiple Choice Single Answer  Question   A type of network where information is transmitted through telephone lines is

  Correct Answer  Wide Area Network

  Your Answer   Wide Area Network

 

 Select The Blank  Question   A Network Interface Card is also called as ________.

  Correct Answer  Network Adapter

  Your Answer   Network Adapter

 

 Multiple Choice Multiple Answer  Question   An NIC will be only functional when

  Correct Answer  Connected to a cable , Driver is Loaded and Configured

  Your Answer   Connected to a cable , Driver is Loaded and Configured , Operated by the Administrator  

 True/False

Page 7: Computer Fundamentals & Networking Concepts

  Question   In walkie-talkie full-duplex data communication is used.

  Correct Answer  False

  Your Answer   False

 

 Select The Blank  Question   A computer is an ________ device used to process data.

  Correct Answer  Electronic

  Your Answer   Electronic

  LIST OF ATTEMPTED QUESTIONS AND ANSWERS  

 

 

 Multiple Choice Multiple Answer  Question   Systems which can be integrated with the home phone are

  Correct Answer  Digital video recorder , Digital subscription TV , Home security system

  Your Answer   Digital video recorder , Digital subscription TV , Home security system

 

 Multiple Choice Single Answer  Question   The Photographs in digital cameras are stored in :

  Correct Answer  Memory

  Your Answer   Memory

 

 Multiple Choice Single Answer  Question   Infrared can be used in transmission of data through :

  Correct Answer  Wireless

  Your Answer   Wireless

 

 Select The Blank  Question   ________ software enables one computer to communicate with other

computer.  Correct Answer  Protocol

  Your Answer   Protocol

 

 Multiple Choice Single Answer  Question   What should be done to increase the exposure and vulnerability of a

computer ?  Correct Answer  Connect to net

  Your Answer   Increase RAM

 

 Multiple Choice Multiple Answer  Question   A computer program usually refers to a

  Correct Answer  Logical Sequence , Set of Instructions , Functional unit

 

Page 8: Computer Fundamentals & Networking Concepts

  Your Answer   Set of Instructions

 

 Select The Blank  Question   A Network topology is majorly concerned with the ________ arrangement

of computers in a network.  Correct Answer  Physical

  Your Answer   Physical

 

 Multiple Choice Single Answer  Question   Which modems are prefered in VoIP computer to computer connection ?

  Correct Answer  DSL

  Your Answer   DSL

 

 Multiple Choice Single Answer  Question   What can enable the server to provide application take over facility for its

peers computers ?  Correct Answer  32 machine cluster

  Your Answer   Organisational Server

 

 Multiple Choice Single Answer  Question   FTP is a program and method used to transfer

  Correct Answer  Files

  Your Answer   Files

 

 Multiple Choice Multiple Answer  Question   Active server pages end with extentions

  Correct Answer  .asp , .aspx

  Your Answer   .asp , .aspx

 

 Select The Blank  Question   A ________ serves as a good and effective documentation of the simple

and complex programs.  Correct Answer  Program Flowcharts

  Your Answer   Program Flowcharts

 

 Multiple Choice Single Answer  Question   To have a successful communication of data mandatorily we require :

  Correct Answer  Sender & Reciever

  Your Answer   Sender & Reciever

 

 Multiple Choice Single Answer  Question   In which technique the data is sliced into packets for transmission over a

network ?

Page 9: Computer Fundamentals & Networking Concepts

  Correct Answer  Statistical time-division multiplexing

  Your Answer   Statistical time-division multiplexing

 

 Multiple Choice Multiple Answer  Question   Protocol is a set of :

  Correct Answer  Procedures , Formal operating rules , Conventions

  Your Answer   Formal operating rules

 

 Select The Blank  Question   Tabulating Machine can read and store data for ________ cards.

  Correct Answer  Punched

  Your Answer   Punched

 

 True/False  Question   A URL specifies the internet address of a file stored on a personal

computer.  Correct Answer  False

  Your Answer   False

 

 True/False  Question   NAS clients are connected to the individual storage devices.

  Correct Answer  False

  Your Answer   False

 

 Select The Blank  Question   The HUB is a center of ________ topology.

  Correct Answer  Star

  Your Answer   Star

 

 Multiple Choice Multiple Answer  Question   Pure input devices include:

  Correct Answer  Keyboard , Mouse , Scanner

  Your Answer   Keyboard , Mouse , Scanner

 

 True/False  Question   CSMA/CA media access is slower than CSMA/CD.

  Correct Answer  True

  Your Answer   True

 

 True/False

Page 10: Computer Fundamentals & Networking Concepts

  Question   A Virtual private network is secure and has predictable performance.

  Correct Answer  True

  Your Answer   True

 

 Multiple Choice Multiple Answer  Question   SAN architecture makes it possible to relocate various activities such as :

  Correct Answer  Backup , Restore , File migration

  Your Answer   Backup , Restore , File migration

 

 True/False  Question   Having a color printer as a globally shared printer on a network of say 10

computers is good practice to avail the benefits of networking.  Correct Answer  True

  Your Answer   True

 

 True/False  Question   Analog signal is measured in volts and its frequency in hertz.

  Correct Answer  False

  Your Answer   True

 

 True/False  Question   Transmission is collection of facts and figures.

  Correct Answer  False

  Your Answer   False

 

 Multiple Choice Multiple Answer  Question   Flowchart is advantageous with respect to

  Correct Answer  Communication , Documentation , Efficient Coding

  Your Answer   Communication , Documentation , Efficient Coding

 

 Multiple Choice Multiple Answer  Question   Which type of documents require greater and more convenient storage ?

  Correct Answer  JPEG , MPEG , MP3

  Your Answer   JPEG , MPEG , MP3

 

 Multiple Choice Multiple Answer  Question   Data transmission is possible in the form of :

  Correct Answer  Serial Communication , Parallel Communication , Synchronous Transmission

  Your Answer   Serial Communication , Parallel Communication , Synchronous Transmission

Page 11: Computer Fundamentals & Networking Concepts

 

 Multiple Choice Single Answer  Question   People use hybrid processors usually when there is a need for :

  Correct Answer  Combined Processing

  Your Answer   Dual Processing

 

 Select The Blank  Question   A ________ generates request in terms of commands to accomplish

certain task.  Correct Answer  Client

  Your Answer   Client

 

 Select The Blank  Question   Computers on the internet use ________ architecture.

  Correct Answer  Client/server

  Your Answer   Client/server

 

 Multiple Choice Multiple Answer  Question   Internet protocols has two basic responsibilities in delivery of data, what are

they ?  Correct Answer  Connectionless , Best-effort

  Your Answer   Connectionless , Best-effort

 

 Select The Blank  Question   ________ is used in most technologies to solve the problem of missing

control character.  Correct Answer  Data stuffing

  Your Answer   Data stuffing

 

 Select The Blank  Question   The WWW is a system of internet servers that support ________ to access

several internet protocols on a single interface.  Correct Answer  Hypertext

  Your Answer   Hypertext

 

 Match The FollowingQuestion Correct Answer Your Answer

Chat server IRC IRC

E-mail SMTP SMTP

Usenet NNTP NNTP

File transfer protocol FTP FTP

 

 Multiple Choice Single Answer

Page 12: Computer Fundamentals & Networking Concepts

  Question   The sender releases the token when it recieves message specifically from a computer which is called as :

  Correct Answer  Reciever

  Your Answer   Reciever

 

 True/False  Question   Monitors are found in flat screen.

  Correct Answer  True

  Your Answer   True

 

 Multiple Choice Multiple Answer  Question   A bar code printed on a product will depict information related to the

following things:  Correct Answer  Manufacturer , Product , Price

  Your Answer   Manufacturer , Product

 

 Multiple Choice Single Answer  Question   Network attached storage create systems which are designed for :

  Correct Answer  Data storage

  Your Answer   Data storage

 

 Multiple Choice Multiple Answer  Question   Select the modern equipments available in the market which use ROM

(Read Only Memory) to store data.  Correct Answer  Video Games , ATM's , Microwave

  Your Answer   Video Games , ATM's , Microwave

 

 Multiple Choice Single Answer  Question   The flow of business process is effectively managed by a networking

concept namely,  Correct Answer  Data Sharing

  Your Answer   Internet Access

 

 Match The FollowingQuestion Correct Answer Your Answer

Satellite Space orbit Space orbit

Radio Frequency range Frequency range

Infrared Light waves Light waves

Microwave Repeater station Repeater station

 

 True/False  Question   In a Synchronous system partners have to sort permission before data

exchange begin.

Page 13: Computer Fundamentals & Networking Concepts

  Correct Answer  True

  Your Answer   False

 

 Select The Blank  Question   All the clients in a ________ topology are connected to a central unit called

a hub.  Correct Answer  Star

  Your Answer   Star

 

 True/False  Question   In simplex data communication the data transfer is in one direction.

  Correct Answer  True

  Your Answer   True

 

 Select The Blank  Question   The pressure of mutiple users of the network leads to implementation of

________.  Correct Answer  Packet based multiplexing

  Your Answer   Packet based multiplexing

  LIST OF ATTEMPTED QUESTIONS AND ANSWERS     

 True/False  Question   To access the world wide web you must

use a operating software.  Correct Answer   False

  Your Answer   False

 

 Multiple Choice Single Answer  Question   The recipient decrypts the message

received by using his own:  Correct Answer   Private Key

  Your Answer   Private Key

 

 Select The Blank  Question   Carrier sense means that each station

listens to ________ prior to transmitting.  Correct Answer   Cable

  Your Answer   Cable

 

 Select The Blank  Question   A ________ attack occurs when an

outsider tries to be part of your network or legal terminal.

  Correct Answer   IP spoofing

Page 14: Computer Fundamentals & Networking Concepts

  Your Answer   IP spoofing

 

 True/False  Question   In parity checking if external interference

introduces an error all the bits will be changed to zero.

  Correct Answer   False

  Your Answer   False

 

 Select The Blank  Question   CSMA/CA media access method is used

on ________ networks.  Correct Answer   Apple

  Your Answer   Apple

 

 Select The Blank  Question   The key feature of a router is its capacity

to determine the ________ path to the destination.

  Correct Answer   Shortest

  Your Answer   Cost effective

 

 Multiple Choice Single Answer  Question   A lost token error occurs when a token

  Correct Answer   Hangs up

  Your Answer   Hangs up

 

 Multiple Choice Single Answer  Question   MICR magnetizes which type of particles

under the magnetic field ?  Correct Answer   Iron oxide

  Your Answer   Iron oxide

 

 Multiple Choice Single Answer  Question   Business houses use the scanner to input

generally :  Correct Answer   Graphical Data

  Your Answer   Graphical Data

 

 Multiple Choice Single Answer  Question   A network topology in which all the nodes

are connected to a single segment trunk is called a:

  Correct Answer   Bus

  Your Answer   Bus

Page 15: Computer Fundamentals & Networking Concepts

 

 True/False  Question   In simplex data communication the data

transfer is in one direction.  Correct Answer   True

  Your Answer   True

 

 Multiple Choice Single Answer  Question   One should always ensure the flowcharts

have a logical  Correct Answer   Start & Finish

  Your Answer   Start & Finish

 

 Multiple Choice Multiple Answer  Question   A Network architecture is concerned with:

  Correct Answer   Cabling Methods , Protocols

  Your Answer   Protocols , Hardware , Software

 

 Multiple Choice Single Answer  Question   When a browser encounters a sound or

video file it hands off the data to other program called

  Correct Answer   Plug-ins

  Your Answer   Plug-ins

 

 Multiple Choice Multiple Answer  Question   Data transmission is possible in the form

of :  Correct Answer   Serial Communication , Parallel

Communication , Synchronous Transmission

  Your Answer   Serial Communication , Parallel Communication , Synchronous Transmission  

 Select The Blank  Question   In video cameras ________ is used to

enhance resolution and color gamut.  Correct Answer   Image Sensors

  Your Answer   Image Sensors

 

 Multiple Choice Multiple Answer  Question   What are the various types of wireless

media available in the market to transfer data ?

  Correct Answer   Radio , Infrared , Bluetooth

  Your Answer   Radio , Infrared , Bluetooth

 

Page 16: Computer Fundamentals & Networking Concepts

 True/False  Question   The NAS devices require no mouse,

keyboard or monitor.  Correct Answer   True

  Your Answer   True

 

 Multiple Choice Multiple Answer  Question   Which programming languages are used

in extending the capabilities of the web ?  Correct Answer   XML , Java , DotNET

  Your Answer   Java , DotNET , XML

 

 Multiple Choice Multiple Answer  Question   The two primary cryptographic systems in

use today are :  Correct Answer   Secret Key , Public Key

  Your Answer   Secret Key , Public Key

 

 Multiple Choice Multiple Answer  Question   What are the nature of attacks on a

system's security over a network ?  Correct Answer   Unauthorized access , Misuse of

resources , Insert spurious packets   Your Answer   Unauthorized access , Misuse of

resources , Insert spurious packets  

 Multiple Choice Single Answer  Question   A technique in which a certain set of

predefined symbols are used to represent the flow of data is known as

  Correct Answer   Flowcharting

  Your Answer   Flowcharting

 

 Select The Blank  Question   A ________ consists of a set of predefined

symbols.  Correct Answer   Flowchart

  Your Answer   Flowchart

 

 Multiple Choice Multiple Answer  Question   Select the parts of a standard keyboard:

  Correct Answer   Function Keys , Modifier Keys , Cursor Keys

  Your Answer   Function Keys , Modifier Keys , Cursor Keys  

 Multiple Choice Multiple Answer  Question   List down different type of web browsers:

Page 17: Computer Fundamentals & Networking Concepts

  Correct Answer   Text , Graphical

  Your Answer   Text , Graphical

 

 True/False  Question   Email makes transmission of business

information secure and easier.  Correct Answer   True

  Your Answer   False

 

 Multiple Choice Multiple Answer  Question   Flowchart is advantageous with respect to

  Correct Answer   Communication , Documentation , Efficient Coding

  Your Answer   Communication , Documentation , Efficient Coding  

 Select The Blank  Question   Generally CPU is called the ________ of

the computer.  Correct Answer   Brain

  Your Answer   Brain

 

 Select The Blank  Question   A computer is used to convert raw data

into ________.  Correct Answer   Information

  Your Answer   Information

 

 True/False  Question   Media access methods refer to how data

moves from one terminal to another over a network.

  Correct Answer   True

  Your Answer   True

 

 True/False  Question   A blog consists of a signed and dated log

of individual postings.  Correct Answer   True

  Your Answer   True

 

 Multiple Choice Multiple Answer  Question   A computer program usually refers to a

  Correct Answer   Logical Sequence , Set of Instructions , Functional unit

  Your Answer   Logical Sequence , Set of Instructions , Functional unit

Page 18: Computer Fundamentals & Networking Concepts

 

 Multiple Choice Single Answer  Question   Secure remote access over the internet for

mobile users and secure LAN connectivity can be achieved by:

  Correct Answer   Virtual private networks

  Your Answer   Virtual private networks

 

 Multiple Choice Multiple Answer  Question   What are the various tags used in HTML

  Correct Answer   Font style , Font size , Hypertext links

  Your Answer   Font style , Font size , Hypertext links

 

 Match The FollowingQuestion Correct Answer Your Answer

Satellite Space orbit Space orbit

Radio Frequency range Frequency range

Infrared Light waves Light waves

Microwave Repeater station Repeater station

 

 True/False  Question   Every file on the internet has a unique

URL.  Correct Answer   True

  Your Answer   True

 

 Select The Blank  Question   In application gateway only ________ has

access to the outside internet  Correct Answer   Main host

  Your Answer   Main host

 

 Select The Blank  Question   In a track ball the user uses his ________

to move the exposed ball.  Correct Answer   Thumb

  Your Answer   Finger

 

 True/False  Question   Storage area network are configured to

provide access to one server.  Correct Answer   False

  Your Answer   False

 

Page 19: Computer Fundamentals & Networking Concepts

 Multiple Choice Single Answer  Question   Fiber optic channels can send data to sites

upto :  Correct Answer   10 Km

  Your Answer   10 Km

 

 Multiple Choice Single Answer  Question   As you expand your connectivity it has

been observed that there is a high rate of problems occur with respect to :

  Correct Answer   Security

  Your Answer   Security

 

 Select The Blank  Question   Network Attached Storage devices

generally run ________ operating system.  Correct Answer   Embedded

  Your Answer   UNIX

 

 Multiple Choice Single Answer  Question   To have a successful communication of

data mandatorily we require :  Correct Answer   Sender & Reciever

  Your Answer   Sender & Reciever

 

 Multiple Choice Multiple Answer  Question   If the data transmitted is in ASCII code, the

frame will consist of :  Correct Answer   Start of header (soh) , End of transmission

(eot) , Data   Your Answer   Start of header (soh) , End of transmission

(eot) , Data  

 Match The FollowingQuestion Correct Answer Your Answer

Fiber Optic Cable Glass Cladding Glass Cladding

Sheilded Twisted Pair

Token Ring Network

Token Ring Network

Unsheilded Twisted Pair

Ethernet Network Ethernet Network

Coaxial Cable Television Cable Network

Television Cable Network

 

 True/False  Question   IP routing protocol are dynamic protocol.

  Correct Answer   False

  Your Answer   True

Page 20: Computer Fundamentals & Networking Concepts

Total no of wrong ans =5 where last quests ans is wrong  LIST OF ATTEMPTED QUESTIONS AND ANSWERS     

 True/False  Question   Digital computers are programmable machines.

  Correct Answer  

True

  Your Answer   True

  Multiple Choice Multiple Answer  Question   Hardware components of a personal computer

will consist of a  Correct Answer  

Hard Disk , Mouse , Floppy

  Your Answer   Hard Disk , Mouse , Floppy

  Multiple Choice Multiple Answer  Question   What additional features are present in

JavaScript which were not present in HTML.  Correct Answer  

Moving tickers , Drop-down menus , Mouse-over interactions

  Your Answer   Drop-down menus , Mouse-over interactions

  Multiple Choice Single Answer  Question   Producing documents over the web is done

using  Correct Answer  

Hypertext markup language

  Your Answer   Hypertext markup language

  Select The Blank  Question   Flowcharts usually help the programmers to

establish healthy communication channel with the ________.

  Correct Answer  

Business Managers

  Your Answer   None of the Above

  Select The Blank  Question   The WWW is a system of internet servers that

support ________ to access several internet protocols on a single interface.

  Correct Answer  

Hypertext

  Your Answer   Hypertext

 

Page 21: Computer Fundamentals & Networking Concepts

  Multiple Choice Single Answer  Question   A software application that uses a network

adapter card to send packets over a LAN is called :

  Correct Answer  

Packet sniffer

  Your Answer   Packet sniffer

  Multiple Choice Multiple Answer  Question   FTP sites are mainly used for transfer of

information such as  Correct Answer  

Softwares , Games , Databases

  Your Answer   Databases

  Multiple Choice Multiple Answer  Question   When configuring a star topology the network

designer oftenly makes it easy to :  Correct Answer  

Add new stations , Monitoring issues , Accommodate different design cables

  Your Answer   Add new stations , Monitoring issues , Accommodate different design cables  

 Multiple Choice Multiple Answer  Question   Choose the devices which can be used to Input

data into a computer.  Correct Answer  

Keyboard , Mouse , Scanner

  Your Answer   Keyboard , Mouse , Scanner

  True/False  Question   The procedure to convert data into information is

called processing.  Correct Answer  

True

  Your Answer   True

  Multiple Choice Single Answer  Question   RAID disks and tape technology are used for

improved :  Correct Answer  

Reliability

  Your Answer   Reliability

  Multiple Choice Multiple Answer  Question   Three ways of transmitting data from one place

Page 22: Computer Fundamentals & Networking Concepts

to another are :  Correct Answer  

Simplex , Half-Duplex , Full-Duplex

  Your Answer   Simplex , Half-Duplex , Full-Duplex

  True/False  Question   Rich site summary can be accessed from any

computer that is connected to LAN.  Correct Answer  

False

  Your Answer   False

  True/False  Question   Storage area network are configured to provide

access to one server.  Correct Answer  

False

  Your Answer   True

  Multiple Choice Single Answer  Question   Fiber optic channels can send data to sites

upto :  Correct Answer  

10 Km

  Your Answer   10 Km

  Multiple Choice Single Answer  Question   It is a network security issue, when sensitive

information about the organization is send to:  Correct Answer  

Competitors

  Your Answer   Competitors

  Select The Blank  Question   Demand priority uses ________ signaling.

  Correct Answer  

Quartet

  Your Answer   Quartet

  Multiple Choice Multiple Answer  Question   Automated management and monitoring tools

helps in :  Correct Answer  

Fault identification , Isolation of cause , Fixatation of error

  Your Answer   Fault identification , Isolation of cause , Fixatation of error , Data replication

Page 23: Computer Fundamentals & Networking Concepts

  Multiple Choice Single Answer  Question   A technique in which a certain set of predefined

symbols are used to represent the flow of data is known as

  Correct Answer  

Flowcharting

  Your Answer   Flowcharting

  Multiple Choice Single Answer  Question   XML is a mark-up language which enables web

designers to create  Correct Answer  

Tags

  Your Answer   Tags

  Select The Blank  Question   Shopping over the internet is possible with

________ web sites.  Correct Answer  

E-commerce

  Your Answer   E-commerce

  Multiple Choice Multiple Answer  Question   A computer program usually refers to a

  Correct Answer  

Logical Sequence , Set of Instructions , Functional unit

  Your Answer   Logical Sequence , Set of Instructions , Functional unit  

 Multiple Choice Single Answer  Question   Every NIC has a Unique identifier which is

hardcoded and is used to uniquely identify it, it is referred as :

  Correct Answer  

MAC Address

  Your Answer   MAC Address

  Select The Blank  Question   An ________ is the most popular form of

network communication system.  Correct Answer  

E-mail

  Your Answer   E-mail

  Select The Blank

Page 24: Computer Fundamentals & Networking Concepts

  Question   Computers on the internet use ________ architecture.

  Correct Answer  

Client/server

  Your Answer   Network

  Multiple Choice Single Answer  Question   Storage area network systems transfer data in

the form of  Correct Answer  

Disk blocks

  Your Answer   Packets

  True/False  Question   A network consists of group of computers

connected each other to share the processing speed of the server and implement software modules.

  Correct Answer  

False

  Your Answer   True

  Select The Blank  Question   SAN make the storage available across the

network on ________ basis.  Correct Answer  

Many-to-many

  Your Answer   One-to-one

  True/False  Question   VoIP is likely to take over the traditional phone

system.  Correct Answer  

True

  Your Answer   True

  Select The Blank  Question   Network attached storage products generally

hide the ________ of the devices.  Correct Answer  

Operating system

  Your Answer   Capacity

  Select The Blank  Question   URL's can have a variety of ________

structures describing the data.

Page 25: Computer Fundamentals & Networking Concepts

  Correct Answer  

Elaborate

  Your Answer   Elaborate

  Multiple Choice Multiple Answer  Question   Internet control message protocol generates

which all types of messages ?  Correct Answer  

Destination unreachable , Time exceeded , Router Solicitation

  Your Answer   Destination unreachable , Time exceeded , Router Solicitation  

 True/False  Question   Flowcharts help the programmers in executing

the program.  Correct Answer  

False

  Your Answer   False

  Select The Blank  Question   NAS add's features from the ________

direction.  Correct Answer  

Bottom

  Your Answer   Bottom

  Match The FollowingQuestion Correct Answer Your Answer

Third Generation IC IC

Forth Generation MicroChip MicroChip

First Generation Vaccume Tubes Vaccume Tubes

Second Generation Transistors Transistors

  Multiple Choice Multiple Answer  Question   Communication devices available for instant

compability with desktop computers specifically for transfer data through :

  Correct Answer  

USB , Bluetooth , Wi-FI

  Your Answer   USB , Bluetooth , Wi-FI

  True/False  Question   Alterations in the program leads to complete

redrawing of the program flowcharts.  Correct True

Page 26: Computer Fundamentals & Networking Concepts

Answer    Your Answer   False

  Multiple Choice Multiple Answer  Question   Protocol feature programs allow users to

  Correct Answer  

Retrive Information , Search Information

  Your Answer   Retrive Information , Search Information

  Multiple Choice Multiple Answer  Question   What are the nature of attacks on a system's

security over a network ?  Correct Answer  

Unauthorized access , Misuse of resources , Insert spurious packets

  Your Answer   Unauthorized access , Misuse of resources , Insert spurious packets , Access data  

 True/False  Question   It is not possible to expand a network once the

setup is complete.  Correct Answer  

False

  Your Answer   False

  Multiple Choice Single Answer  Question   When the network is spread across the buildings

it is called as  Correct Answer  

Wide Area Network

  Your Answer   Local Area Network

  Multiple Choice Single Answer  Question   SAN connects storage devices to a

heterogeneous set of servers for  Correct Answer  

Sharing resources

  Your Answer   Sharing resources

  Multiple Choice Single Answer  Question   A lost token error occurs when a token

  Correct Answer  

Hangs up

  Your Answer   Hangs up

  Match The Following

Page 27: Computer Fundamentals & Networking Concepts

Question Correct Answer Your Answer

VoIP Lease line Lease line

Wi-Fi Wireless card Wireless card

SAN Fiber Channels Ethernet Connection

NAS Ethernet Connection External card

  Select The Blank  Question   Tokens on a network are usually ________

bytes in length.  Correct Answer  

3

  Your Answer   3

  True/False  Question   In demand priority media access method the

terminals cannot send and receive data at the same time.

  Correct Answer  

False

  Your Answer   False

Page 28: Computer Fundamentals & Networking Concepts