Almost all MCQs of Computer

December 2022

Types of Cyber Crimes

❖ General Intrusions
✧ Hacking, spyware, phishing, pharming,
✧ Sending computer viruses & worms to invade computers
✧ Causing denial of service attacks
✧ Creating bots, Trojan horses, zombie machines

 

❖ Nuisances (usually non-violent activities)
✧ Sending spam
✧ Changing web page text and images
✧ Redirecting websites

 

❖ Personal Identity Theft (using someone else’s name or credit)
✧ Phishing for private information, passwords, code numbers
✧ Making unauthorized purchases with stolen credit cards or ID
✧ Destroying personal reputation
✧ Damaging personal credit ratings

 

❖ Theft of Intellectual Property (stealing ideas or creations of others)
✧ Downloading copyrighted music & videos
✧ Plagiarism, cheating
✧ Software piracy

 

❖ Physical or Mental Damage
✧ Cyberbullying, harassment
✧ Cyberstalking
✧ Sexual exploitation of minors, child pornography

 

❖ Terrorism
✧ Stealing military and private industry secrets – espionage
✧ Brainwashing and recruiting new followers
✧ Building terrorist communications network

 

General Intrusions

 1: sending Computer virus/Worm to invade computers

The ILOVEYOU virus comes in an e-mail note with “I LOVE YOU” in the subject line
and contains an attachment that, when opened, results in the message being re-sent to
everyone in the recipient’s Microsoft Outlook address book and, perhaps more seriously,
the loss of every JPEG, MP3, and certain other files on the recipient’s hard disk

 

2: Malware/trojans

A Trojan takes its name from the term ‘Trojan Horse’. It is a type of computer virus that
can be installed on your computer without you realising.

 

One variation of a Trojan installs a ‘keystroke logger’ on your computer. This records the
words and numbers you type when you use your computer keyboard. If you login to your
online bank account, the keystroke logger will record your login information.

 

It is suggested that you should use virtual keyboard while doing net banking. Virtual
Keyboard is an online application to enter password with the help of a mouse.The Virtual
Keyboard is designed to protect your password from malicious “Spyware” and “Trojan
Programs”. Use of Virtual keyboard will reduce the risk of password theft.

 

3: stealing internet user name and password

 

Trojan captured the username and password fields from
the dialup screen and sent a mail to the culprits in encrypted form

 

4: email Fraud

Quick degree scams – “Get your degree in 30 days!” “No studying required”, “Turn
your experience into a degree”. They say they are accredited and the degree is legal and
meaningful. That’s part of the scam.

 

Personal identity theft

Spamming, Redirecting websites & Phishing

 

5: Phishing

how does phishing happen?
• Phishers sets up a replica page of a known financial institution or a popular shopping
website
• Bulk e-mails are sent to users asking for their personal data like account details,
passwords etc
• When the user clicks on the link, the replica of the website will open. Or while the
user is online, a form will populate through an “in-session pop-up”
• On updation, the data goes to phishers. Post which the user is redirected to the
genuine website
Phishers have refined their technology to launch sophisticated attacks and use advanced
social engineering techniques to dupe online banking users.

 

7: Cyber bullying

 

8: Cyberstalking

 

how do they operate
a. Collect all personal information about the victim such as name, family background,
Telephone Numbers of residence and work place, daily routine of the victim, address of residence and place of work, date of birth etc. If the stalker is one of the acquaintances of the victim he can easily get this information. If stalker is a stranger to victim, he collects the information from the internet resources such Network Security 125
as various profiles, the victim may have filled in while opening the chat or e-mail account or while signing an account with some website.

 

9: Cyber Pornography

 

10: social networking

Ways to protect yourself on social networking sites:

limit who can see what you post

limit what you post
 

1
. What is operating system?
  • collection of programs that manages hardware resources
  • system service provider to the application programs
  • link to interface the hardware and application programs
  • all of the mentioned
D. all of the mentioned
2
. To access the services of operating system, the interface is provided by the
  • system calls
  • API
  • library
  • assembly instructions
D. assembly instructions
3
. Which one of the following error will be handle by the operating system?
  • power failure
  • lack of paper in printer
  • connection failure in the network
  • all of the mentioned
D. all of the mentioned
4
. The main function of the command interpreter is
  • to get and execute the next user-specified command
  • to provide the interface between the API and application program
  • to handle the files in operating system
  • none of the mentioned
A. to get and execute the next user-specified command
5
. By operating system, the resource management can be done via
  • time division multiplexing
  • space division multiplexing
  • both (a) and (b)
  • none of the mentioned
C. both (a) and (b)
6
. If a process fails, most operating system write the error information to a
  • log file
  • another running process
  • new file
  • none of the mentioned
A. log file
7
. The systems which allows only one process execution at a time, are called
  • uniprogramming systems
  • uniprocessing systems
  • unitasking systems
  • none of the mentioned
A. uniprogramming systems
8
. In operating system, each process has its own
  • address space and global variables
  • open files
  • pending alarms, signals and signal handlers
  • all of the mentioned
D. all of the mentioned
9
. A process can be terminated due to
  • normal exit
  • fatal error
  • killed by another process
  • all of the mentioned
D. all of the mentioned
10
. What is the ready state of a process?
  • when process is scheduled to run after some execution
  • when process is unable to run until some task has been completed
  • when process is using the CPU
  • none of the mentioned
A. when process is scheduled to run after some execution


1
. ALU stands for
  • Arithmetic Logic Unit
  • Application Logic Unit
  • Array Logic Unit
  • None of above
A. Arithmetic Logic Unit
2
. The brain of any computer system is
  • ALU
  • CPU
  • None of above
  • Memory
  • Control Unit
B. CPU
3
. What difference does the 5th generation computer have from other generation computers?
  • Technological advancement
  • Object Oriented Programming
  • Scientific code
  • All of the above
D. All of the above

The key technologies for the Fifth Generation Computer System (FGCS) seem to be VLSI architecture, parallel processing such as data flow control, logic programming, knowledge base based on relational database, and applied artificial intelligence and pattern processing.Inference machines and relational algebra.

4
. Which of the following computer generation uses concept of artificial intelligence?
  • First Generation
  • Second Generation
  • Third Generation
  • Forth Generation
D. Forth Generation
5
. When a key is pressed on keyboard, which standard is used for converting the keystroke into the corresponding bits
  • ANSI
  • ASCII
  • EBCDIC
  • ISO
B. ASCII
6
. Which device is used as the standard pointing device in a Graphical User Environment
  • Keyboard
  • Mouse
  • Joystick
  • trackball
B. Mouse
7
. Which of the following is valid storage type?
  • CPU
  • Keyboard
  • Pen Drive
  • Track Ball
  • None of the above
C. Pen Drive
8
. The section of the CPU that is responsible for performing mathematical operations
  • Memory
  • Register Unit
  • Control Unit
  • ALU
  • None of the above
D. ALU
9
. Any storage device added to computer beyond the immediately usable main storage is known as:
  • Floppy disk
  • Hard Disk
  • Backing store
  • Punched Card
  • None of the above
A. Floppy disk
10
. The list of coded instructions is called
  • Computer Program
  • Algorithm
  • Flowchart
  • Utility Program
A. Computer Program


1
. Source code is available to view, modify and redistribute in
  • Open Source
  • Closed Source
  • Proprietary
  • Licensed
  • None of the above
A. Open Source
2
. Which of the following is not input device
  • Touch Pad
  • Mouse
  • Printer
C. Printer
3
. MS Word is example of Closed Source Software
  • True
  • False
A. True
4
. Software required to run the hardware is known as
  • Joystick
  • Task Manager
  • Task Bar
  • Program Manager
  • Device Driver
E. Device Driver
5
. Which the following is application software?
  • Compiler
  • Power Point
  • Debugger
B. Power Point
6
. Which of the following is system software?
  • Linux
  • Word
  • Excel
  • Tally
A. Linux
7
. The Programs which are as permanent as hardware and stored in ROM is known as
  • Hardware
  • Software
  • Firmware
  • ROMware
C. Firmware
8
. Which of the following is invalid type of memory
  • RAM (Random Access Memory)
  • ROM (Read Only Memory)
  • PRAM (Programmable Read Access Only Memory )
  • EPROM (Erasable Programmable Read Only
C. PRAM (Programmable Read Access Only Memory )
9
. C langauge were used in________of computers
  • A First Generation
  • Second Generation
  • Third Generation
  • Fifth Generation
B. Second Generation
10
. which of the following is not component of computer system?
  • Input Device
  • Stepper Motor
  • Memory
  • None of the above
B. Stepper Motor


1
. Which of the following is not output device?
  • Printer
  • VDU
  • Scanner
  • All
C. Scanner
2
. Joystick is used for____________
  • Gaming
  • Weather forecast
  • Word Processing
A. Gaming
3
. Trackball is output device
  • True
  • False
B. False
4
. ALU is part of Memory
  • True
  • False
B. False
5
. CPU consist of
  • ALU+CU
  • ROM+ALU
  • RAM+ROM
  • None
  • All
A. ALU+CU
6
. _______is Volatile Memory
  • ROM
  • EPROME
  • RAM
  • None
C. RAM
7
. _____________ is non volatile memory
  • RAM
  • EERAM
  • ROM
  • PROME
C. ROM
8
. Which of the following is the Valid Measurement unit of memory
  • GB
  • MB
  • KB
  • All
D. All
9
. Hardware can work without device driver
  • True
  • False
B. False
10
. Which of the following if not OS
  • Android
  • MAC
  • Samsung
  • LINUX
C. Samsung


1
. DVD is having more storage capacity than CD
  • True
  • False
A. True
2
. Tally is __________
  • Open S/W
  • Closed S/W
  • Application s/w
  • System s/w
C. Application s/w
3
. VLSI is used in _________ Generation of computer
  • First
  • Second
  • Third
  • Fourth
D. Fourth
4
. __________ Interprets and executes set of instruction
  • CPU
  • VDU
  • Printer
  • Scanner
A. CPU
5
. __________consists of set of instruction
  • Software
  • Hardware
  • Program
  • None of this
C. Program
6
. ___________consists of set of program s
  • Scanner
  • VDU
  • Software
C. Software
7
. Paint brush is text editor
  • True
  • False
B. False
8
. Notepad is text editor
  • True
  • False
  • None of this
A. True
9
. Keyboard Converts typed in character to ___________code
  • EBCIDIC
  • ASCII
  • Decimal
  • Binary
B. ASCII
10
. __________Unit control the operation of CPU
  • ALU
  • RAM
  • CU
  • BU
C. CU


1
. Which of the following is not the classification of computers based on application?
  • Electronic Computers
  • Digital Computers
  • None
  • all
C. None
2
. Which one of the following is not a feature of third generation languages?
  • They need to get translated
  • They are easy to use than MMLs
  • They are faster than MLLs
  • They use compilers and interpreters
C. They are faster than MLLs
3
. Which is the type of memory for information that does not change on your computer?
  • RAM
  • RW/RAM
  • ERAM
B. RW/RAM
4
. LSI,VLSI & ULSI chips were used in which generation?
  • Fifth
  • Second
  • Third
  • Fourth
D. Fourth
5
. Which characteristics of computer distinguishes it from electronic calculation?
  • Accuracy
  • Storage
  • Versatility
  • Automatic
B. Storage


 


1
. Microsoft .NET is _________
  • Open Source
  • Closed Source
  • Browser
  • All of above
B. Closed Source
2
. ls the windows command
  • True
  • False
B. False
3
. Which of the following command gives the list of the users in the systems
  • whoami
  • ps
  • ds
  • who
D. who
4
. ________is the linux flavor which runs from CD
  • Knopix
  • SUSE
  • Fedora
  • Ubuntu
A. Knopix
5
. OSF stands for___________
  • O.S. Factory
  • Open system foundation
  • Open software foundation
  • None
C. Open software foundation
6
. Open source software are very costly
  • True
  • False
B. False
7
. Internet Explorer comes along with ________
  • Linux
  • Windows
  • MAC
  • Android
B. Windows
8
. which browser comes with linux by default
  • Mozilla Firebox
  • IE
  • Opera
  • None
A. Mozilla Firebox
9
. BOSS is developed in _______
  • USA
  • UK
  • India
  • China
C. India
10
. Which of the following is the closed source
  • 3D Max
  • Blender
  • Linux
A. 3D Max


1
. PHP is the Open Source
  • True
  • False
A. True
2
. _______ Determines which piece of large program need to be recompiled
  • rpm
  • make
  • yum
  • None of above
B. make
3
. ________Execute a command as another user
  • who
  • tty
  • chmod
  • sudo
D. sudo
4
. ________ is used to install and remove packages and control downloading them from a repository
  • rpm
  • who
  • yum
  • ls
A. rpm
5
. Which of the following is not flavor of linux?
  • Mandrake
  • SUSAN
  • Redhat
  • Fedora
B. SUSAN
6
. 7-zip is ___________
  • File achiever
  • Web browser
  • Editor
  • None of above
A. File achiever
7
. Ubuntu is windows based
  • True
  • False
B. False
8
. ________ is HTTP web server
  • Lucene
  • Fedora
  • Perl
  • Apache
D. Apache
9
. Symbian is valid Linux Based Shell
  • True
  • False
A. True
10
. Following is valid Linux based Shell
  • C-shell
  • D-shell
  • K-shell
  • None of above
A. C-shell

 

1
. Eclipse is an IDE developed in________
  • C
  • c++
  • java
  • python
A. C
2
. IDE consists of
  • sources code editor
  • automation tool builder
  • Interpreter or dedugger or both
  • all of this
C. Interpreter or dedugger or both
3
. CDT in Eclipse is environment for java developers
  • true
  • false
B. false
4
. Eclipse is an_________
  • compiler
  • IDE
  • Interpreter
  • All Of Mentioned
D. All Of Mentioned
5
. Source code for python is freely available.
  • true
  • false
A. true
6
. Eclipse is closed source
  • true
  • false
B. false
7
. CDT does not provide content assistant provider.
  • true
  • false
A. true
8
. Eclipse supports programming in PHP
  • true
  • false
A. true
9
. Eclipse supports programming in Ruby.
  • true
  • false
A. true
10
. Eclipse supports programming in Perl
  • true
  • false
A. true

1
. The term ‘Computer’ is derived from……….
  • Latin
  • German
  • French
  • Arabic
A. Latin
2
. Who is the inventor of “Difference Engine”?
  • Allen Turing
  • Charles Babbage
  • Simur Cray
  • Augusta Adaming
B. Charles Babbage
3
. Who is the father of Computer?
  • Allen Turing
  • Charles Babbage
  • Simur Cray
  • Augusta Adaming
B. Charles Babbage
4
. Who is the father of Computer science?
  • Allen Turing
  • Charles Babbage
  • Simur Cray
  • Augusta Adaming
A. Allen Turing
5
. Who is the father of personal computer?
  • Edward Robert
  • Allen Turing
  • Charles Babbage
  • None of these
A. Edward Robert
6
. A CPU contains
  • a card reader and a printing device
  • an analytical engine and a control unit
  • a control unit and an arithmetic logic unit
  • an arithmetic logic unit and a card reader
C. a control unit and an arithmetic logic unit
7
. Which of the following controls the process of interaction between the user and the operating system?
  • User interface
  • Language translator
  • Platform
  • Screen saver
A. User interface
8
. The first computers were programmed using
  • assembly language
  • machine language
  • source code
  • object code
B. machine language
9
. ……….is a combination of hardware and software that facilitates the sharing of information between computing devices
  • network
  • peripheral
  • expansion board
  • digital device
A. network
10
. Coded entries which are used to gain access to a computer system are called
  • Entry codes
  • Passwords
  • Security commands
  • Code words
B. Passwords

1
. A computer network permits sharing of
  • Resources
  • Information 
  • Both a & b
  • None of these
C. Both a & b
2
. The first operational computer network in the world was the _________ for the United States Department of Defense
  • ARPANET 
  • ERNET
  • SKYNET
  • DARPANET
A. ARPANET 
3
. ATM stands for
  • Automatic taller machine 
  • Automated teller machine
  • Automatic transfer machine
  •  Automated transfer machine
B. Automated teller machine
4
. _______ is the technology that connects the machines and people within a site in a small area
  • LAN 
  • MAN
  • WAN
  • None of these
A. LAN 
5
. ______ is a network that covers geographic areas that are larger, such as districts or cities
  • LAN 
  • MAN 
  • WAN
  • None of these
B. MAN 
6
. ______ is a network that this technology connects sites that are in diverse locations
  • LAN
  • MAN
  • WAN 
  • None of these
C. WAN 
7
. ______ is a collection of point-to-point links that may form a circle
  • LAN
  • MAN
  • WAN
  • Ring topology
D. Ring topology
8
. The ISDN Internetworking Equipment devices are
  • Terminal Adapters(TAs)
  • ISDN Bridges
  • ISDN Routers
  • All of these
D. All of these
9
. ATM networks are
  • connectionless
  • Interconnected
  • connection oriented
  • None of these
C. connection oriented
10
. DHCP stands for
  • Dynamic Host Configuration Protocol
  • Digital Host Communication Provider
  • Digital Host Communication Protocol
  • Dynamic Host Configuration Provider
A. Dynamic Host Configuration Protocol
1
. Which protocol layer uses the protocols are WWW, HTTP, FTP, SMTP, e-mail etc
  • Application Layer Protocol
  • Transport Layer Protocol
  • Internet Layer Protocol
  • Hardware Layer
A. Application Layer Protocol
2
. The internetworking protocol is known as
  • SMTP
  • PPP
  • TCP/IP 
  • NNTP
C. TCP/IP 
3
. If single computer network is divided into segments and router are added between them it forms an
  • Internet
  • Internetwork 
  • Network
  • Internetworking
B. Internetwork 
4
. Check sum is used for
  • Error correction
  • Error detection 
  • Both a & b
  • None of these
B. Error detection 
5
. The type of packet format supported by X.25 are as follows
  • Control packet
  • Data packet
  • Both a & b 
  • None of these
C. Both a & b 
6
. ISDN stands for
  • Integrated Service Digital Network 
  • Interaction System Digital Network
  • Inexpensive System Digital Network
  • None of these
A. Integrated Service Digital Network 
7
. If routing information is automatically updated by routers when changes are made to the network configuration are called
  • Fixed routing
  • Dynamic routing 
  • Both a & b
  • Distributed routing
B. Dynamic routing 
8
. ARP stands for
  • Address Resolution Protocol 
  • Address Routing Protocol
  • Address Routing Packet
  • Address Routing Program
A. Address Resolution Protocol 
9
. If two or more routers are connected to the same subnet, the network administration determines which of the routers the messages should be sent to eliminate this problem._____ are used
  • MAC messages
  • ICMP messages
  • INDP messages
  • IMCP messages
B. ICMP messages
10
. If two or more routers are available in distributed routing, which route should be selected
  • High possible cost
  • Least possible cost
  •  Link cost
  • Both b & c
C.  Link cost

1
. How many frames are included for traffic in 26TDMA frames
  • 1
  •  24 
  • 25
  • 16
B.  24 
2
. What is the port number of the HTTP
  • 80
  • 25
  • 23
  • 20/21
A. 80
3
. What is the port number of the SMTP
  • 25 
  • 23
  • 20/21
  • 27960
A. 25 
4
. TCP is ______________
  • Connection-oriented
  • Reliable
  • Both a & b
  • None of these
C. Both a & b
5
. Which is a network protocol that is based on UDP and is a component of the Internet Protocol Suite, defined by IETF(Internet Engineering Task Force)
  • SNMP 
  • Scalability
  • Screening
  • Multicasting
A. SNMP 
6
. In X.25 defines the protocols from
  • Layer 2 to Layer 3
  • Layer 1 to Layer 2
  • Layer 1 to Layer 3
  • Layer 3 to Layer 2
C. Layer 1 to Layer 3
7
. Advantages of cell relay are
  • High-speed transmission
  • Multiplexing transmission
  • Both a & b
  • None of these
C. Both a & b
8
. When compared with the OSI reference model, the IEEE standard contains the following layers:
  • Physical layer
  • Medium access control(MAC) equivalent to the lower part of the OSI data link layer
  • Logical link layer(LAC) equivalent to the upper part of the data link layer
  • Network layer, the OSI network layer, that performs some of the higher order layer functions
  • All of these
E. All of these
9
. In a token ring, the stations are connected to the __________
  •  Logical ring 
  • Physical ring
  • Both a & b
  • None of these
A.  Logical ring 
10
. A _________ preamble is used to synchronize the receiver’s clock
  • Four-byte
  • Three-byte
  • Two-byte
  • One-byte
D. One-byte


1
. Network of networks is known as _________
  • intranet
  • internet
  • Local Area Network
  • WAN
B. internet
2
. An interconnection of ________________________ computers is called an Internet
  • Distributed
  • Co-Ordinated
  • Autonomous
  • Integrated
C. Autonomous
3
. When a packet with the code is transmitted, it is received and processed by every machine on the network. This mode of operation is called
  • broadcasting
  • multi casting
  • unicasting
  • point-to-point
A. broadcasting
4
. point-to-point transmission with one sender and one receiver is sometimes called ________
  • multicasting
  • unicasting
  • personal area network
  • LAN
B. unicasting
5
. The entities comprising the corresponding layers on different machine are called ________
  • protocol
  • peers
  • interface
  • flow control
B. peers
6
. When the packets are small and all the same size, they are often called ________
  • packet switched
  • cells
  • circuit switched
  • virtual circuit
B. cells
7
. A collection of interconnected networks is called as __________
  • internet
  • intranet
  • topology
  • interface
A. internet
8
. Starting around 1988, the more advanced ______ twisted pairs were introduced.
  • category3
  • category5
  • category8.
  • category10
B. category5
9
. Each ray is said to have a different mode, so a fiber having this property is called ________
  • unimode
  • singlemode
  • multimode
  • triplemode
C. multimode
10
. The number of oscillations per second of a wave is called its ______
  • wavelength
  • frequency
  • spectrum
  • sequence
B. frequency


1
. If a computer on the network shares resources for others to use, it is called _____
  • server
  • client
  • mainframe
  • microcomputer
A. server
2
. For large networks _____ topology is used.
  • bus
  • ring
  • star
  • irregular
C. star
3
. X.25 is an example of __________ network.
  • packet switched
  • circuit switched
  • frame relay
  • ring based
A. packet switched
4
. What is the maximum length of STP?
  • 100 ft
  • 200ft 
  • 100m
  • 200m
D. 200m
5
. ISDN is an example of _______ network.
  • packet switched
  • circuit switched
  • frame relay
  • ring based
B. circuit switched
6
. What is the maximum data capacity of STP?
  • 10 mbps
  • 100 mbps
  • 1000 mbps
  • 10000 mbps
B. 100 mbps
7
. In ______ topology if the computer cable is broken, networks get down
  • bus
  • ring
  • star
  • irregular
A. bus
8
. Terminators are used in ________ topology.
  • bus
  • ring
  • star
  • irregular
A. bus
9
. ________ layer decides which physical path the data should take.
  • Network
  • Transport
  • Physical
  • Data Link
C. Physical
10
. Print server uses spool which is a ______ that holds data before it is send to the printer.
  • queue
  • buffer
  • node
  • ring
B. buffer

  

1
. Protocols in which the sender sends one frame and then waits for an acknowledgement before proceeding are called __________
  • sliding window.
  • stop and wait.
  • frame buffer.
  • analog.
B. stop and wait.
2
. The data link layer takes the packet it gets from the network layer and encapsulates them into ___________
  • cells
  • frames
  • packet
  • trailer
B. frames
3
. The data link layer takes the packets from _____ and encapsulates them into frames for transmission.
  • network layer
  • physical layer
  • transport layer
  • application layer
A. network layer
4
. Which one of the following task is not done by data link layer?
  • framing
  • error control
  • flow control
  • channel coding
D. channel coding
5
. Protocols in which the sender waits for a positive acknowledgement before advancing to the next data item are often called ___________
  • ARQ
  • PPR
  • ARS
  • PRP
A. ARQ
6
. The commonly used protocol for webpage transfer is ________
  • HTML
  • HTTP
  • WML
  • WTTP
B. HTTP
7
. The frames which are intimated for receiving are called ________
  • sending window.
  • receiving window
  • sender
  • receiver
B. receiving window
8
. The analysis which helps in checking whether the protocol is correct is _________
  • reachability
  • correctness
  • reliability
  • redundancy
A. reachability
9
. The IP address of a system can be known using the DOS command _______
  • ipconfir
  • ipconfig
  • ipconf 
  • ipnum
B. ipconfig
10
. Datagrams using header extension are called __________
  • payload
  • trailer
  • datagram packets
  • jumbograms
D. jumbograms


1
. Modulation is the process of ________
  •  sending a file from one computer to another computer
  • converts digital signals to analog signals
  • converting analog signals to digital signals
  • echoing every character that is received
D. echoing every character that is received
2
. Which one of the following is a data link protocol?
  • ethernet
  • point to point protocol
  • HDLC
  • all the above
D. all the above
3
. Which of the following is used for modulation and demodulation?
  • Modem
  • Protocols
  • Gateway
  • Multiplexer
A. Modem
4
. A software that allows a personal computer to pretend it as a terminal is _______
  • auto dialing
  • bulletin board
  • modem
  • terminal emulation
D. terminal emulation
5
. Which sublayer of the data link layer performs data link functions that depend upon the type of medium?
  • logical link control sublayer
  • media access control sublayer
  • network interface control sublayer
  • none of the mentioned
B. media access control sublayer
6
. Which layer of OSI model is responsible for creating and recognizing frame boundaries?
  • Physical layer
  • Data link layer.
  • Transport layer
  • Network layer
B. Data link layer.
7
. If digital data rate of 9600 bps is encoded using 8 – level phase shift keying (PSK) method, the modulation rate is ______
  • 1200 bands
  • 3200 bands
  • 4800 bands
  • 9600 bands
C. 4800 bands
8
. Four bits are used for packet sequence numbering in a sliding window protocol. What is the maximum window size?
  • 4
  • 8
  • 15
  • 16
C. 15
9
. Header of a frame generally contains
  • synchronization bytes
  • addresses
  •  frame identifier
  • all the above
D. all the above
10
. The ________ model shows how the network functions of a computer ought to be organized.
  • CCITT
  • OSI
  • ISO
  • ANSI
B. OSI


1
. In an optical fiber the inner core is ______ the cladding.
  • more dense than
  • the same density as
  • less than dense
  • another name for
A. more dense than
2
. The inner core of an optical fiber is _____ in composition.
  • glass or plastic
  • bimetallic
  • copper
  • liquid
A. glass or plastic
3
. Bits can be send over guided and unguided media as analog signal by
  • digital modulation
  • amplitude modulation
  • frequency modulation
  • phase modulation
A. digital modulation
4
. The radio communication spectrum is divided into bands based on ___________
  • amplitude
  • cost and hardware
  • frequency
  • transmission media.
C. frequency
5
. When a beam of light travels through media of two different densities, if the angle of incidence is greater than the critical angle, ______ occurs.
  • reflection
  • refraction
  • incidence
  • criticism
A. reflection
6
. In a noisy environment, the best transmission medium would be _________
  • twisted pair
  • optical fiber
  • coaxial cable
  • the atmosphere
B. optical fiber
7
. What is the frequency range used for FM radio transmission?
  • Low frequency: 30 KHz to 300 MHz.
  • Very Low Frequency : 0 Hz to 30 Hz.
  • High frequency : 3 MHz to 30 MHz.
  • Very High Frequency : 30 MHz to 300 MHz.
D. Very High Frequency : 30 MHz to 300 MHz.
8
. End-to-end connectivity is provided from host-to-host in _________
  • session layer
  • presentation layer.
  • transport layer
  • network layer
C. transport layer
9
. The portion of physical layer that interfaces with the media access control sublayer is called
  • physical signalling sublayer
  • physical data sublayer
  • physical address sublayer
  • none of the mentioned
A. physical signalling sublayer
10
. PSS was introduced in the year ________
  • 1961
  • 1971
  • 1981
  • 1991
C. 1981


1
. What is the main function of the transport layer?
  • Node-To-Node Delivery
  • Process-To-Process Message Delivery
  • Synchronization
  • Updating And Maintenance Of Routing Tables
B. Process-To-Process Message Delivery
2
. Session layer checkpoints _____
  • allow just a portion of a file to be resent
  • control the addition of the headers
  • detect and recover errors
  • are involved in dialog control
A. allow just a portion of a file to be resent
3
. To deliver a message to the correct application program running on a host , the _______ address must be consulted.
  • port
  • IP
  • physical
  • tunnel
A. port
4
. When a host on network A sends a message to a host on network B, which address does the router look at?
  • Port
  • Physical
  • IP
  • Tunnel
C. IP
5
. Which of the following is possible in a taken passing bus network?
  • In-service expansion
  • Unlimited number of stations
  • Unlimited distance
  • Limited distance
A. In-service expansion
6
. One important characteristics of the hub architecture of ARC-net is
  • directionalized transmission
  • access control and addressing
  • multiple virtual networks
  • alternative routing.
A. directionalized transmission
7
. What is the main purpose of a data link content mirror?
  •  To detect problems in protocol
  • To determine the type of switching used in a data link
  • To determine the type of transmission used in a data link
  • To determine the flow of data.
A.  To detect problems in protocol
8
. Which of the following is not a standard synchronous communication protocol?
  • SDLC
  • SLIP
  • SMTP
  • PAS
D. PAS
9
. IPV6 has _____ bit addresses.
  • 32
  • 4
  • 128
  • variable
C. 128
10
. In fiber optics,the signal source is ______ waves.
  • light
  • infrared
  • radio
  • very low frequency.
A. light

MKRdezign

Contact Form

Name

Email *

Message *

Powered by Blogger.
Javascript DisablePlease Enable Javascript To See All Widget