/ Sample Test,Sample questions

Question:
 Which of these is a standard interface for serial data transmission?

1.ASCII

2.RS232C

3.2

4.Centronics

Posted Date:-2021-12-26 18:50:00


Question:
A collection of hyperlinked documents on the internet forms the ?.?

1.World Wide Web (WWW)

2.E-mail system

3.Mailing list

4.Hypertext markup language

Posted Date:-2021-12-26 18:55:38


Question:
A proxy server is used as the computer?

1.(a) with external access

2.acting as a backup

3.performing file handling

4.accessing user permissions

Posted Date:-2021-12-26 21:53:10


Question:
At what speed does tele-computed refer?

1.Interface speed

2.Cycles per second

3. Baud rate

4.Megabyte load

Posted Date:-2021-12-26 22:10:09


Question:
Parity bits” are used for which of the following purposes?

1. Encryption of data

2.To transmit faster

3.To detect errors

4.To identify the user

Posted Date:-2021-12-26 18:53:15


Question:
Software programs that allow you to legally copy files and give them away at no cost are called which of the following?

1.Probe ware

2.Timeshare

3.Shareware

4.Public domain

Posted Date:-2021-12-26 22:08:23


Question:
The IP network 192.168.50.0 is to be divided into 10 equal sized subnets. Which of the following subnet masks can be used for the above requirement?

1.255.243.240

2.255.255.0.0

3.255.255.0

4.255.255.255

Posted Date:-2021-12-26 22:13:27


Question:
The length of an IPv6 address is?

1.32 bits

2.128 bits

3.256 bits

4.256 bits

Posted Date:-2021-12-26 22:15:20


Question:
The location of a resource on the internet is given by its?

1. Protocol

2.URL

3. E-mail address

4.ICQ

Posted Date:-2021-12-26 18:57:11


Question:
The maximum length (in bytes) of an IPv4 datagram is?

1. 32

2.1024

3.65535

4.512

Posted Date:-2021-12-26 22:11:26


Question:
The term FTP stands for?

1.File transfer program

2.File transmission protocol

3.File transfer protocol

4.File transfer protection

Posted Date:-2021-12-26 22:09:14


Question:
The term HTTP stands for?

1.Hyper terminal tracing program

2.Hypertext tracing protocol

3.Hypertext transfer protocol

4.Hypertext transfer program

Posted Date:-2021-12-26 21:52:16


Question:
What kind of transmission medium is most appropriate to carry data in a computer network that is exposed to electrical interferences?

1.Unshielded twisted pair

2.Optical fiber

3.Coaxial cable

4.Microwave

Posted Date:-2021-12-26 18:54:29


Question:
When the mail server sends mail to other mail servers it becomes ___ ?

1. SMTP client

2.SMTP server

3.Peer

4.Master

Posted Date:-2021-12-26 22:14:22


Question:
Which of the following best describes uploading information?


1.Sorting data on a disk drive

2.Sending information to a host computer

3.Receiving information from a host computer

4.Sorting data on a hard drive

Posted Date:-2021-12-26 21:59:14


Question:
Which of the following statements could be valid with respect to the ICMP (Internet Control Message Protocol)?

1.It reports all errors which occur during transmission.

2.A redirect message is used when a router notices that a packet seems to have been routed wrongly.

3.It informs routers when an incorrect path has been taken.

4.The “destination unreachable” type message is used when a router cannot locate the destination.

Posted Date:-2021-12-26 22:12:40


Question:
Which of the following transmission directions listed is not a legitimate channel?

1. Simplex

2.Half Duplex

3.Full Duplex

4.Double Duplex

Posted Date:-2021-12-26 18:52:05


Question:
Which one of the following is a valid email address?

1. btechgeeks@geek.com

2.gmail.com

3. tpoint@.com

4.btechgeeks@books

Posted Date:-2021-12-26 21:57:54


Question:
Which one of the following is not a network topology?

1.Star

2.Ring

3.Bus

4.Peer to Peer

Posted Date:-2021-12-26 22:10:48


Question:
Which one of the following is the most common internet protocol?

1.HTML

2.NetBEUI

3.TCP/IP

4.IPX/SPX

Posted Date:-2021-12-26 21:59:54


Question:
Which one of the following would breach the integrity of a system?

(a) Looking the room to prevent theft
(b) Full access rights for all users
(c) Fitting the system with an anti-theft device
(d) Protecting the device against willful or accidental damage

1. Looking the room to prevent theft

2.Full access rights for all users

3.Fitting the system with an anti-theft device

4.Protecting the device against willful or accidental damage

Posted Date:-2021-12-26 21:56:14


Question:
Which software prevents the external access to a system?

1.Firewall

2.Gateway

3.Router

4. Virus checker

Posted Date:-2021-12-26 21:56:59


Question:
Which type of topology is best suited for large businesses which must carefully control and coordinate the operation of distributed branch outlets?

1. Ring

2.Local area

3.Hierarchical

4.Star

Posted Date:-2021-12-26 18:51:01


More MCQS

  1. help4info.com
  2. help4info.com
  3. help4info.com
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!