View MCQ Question

(Q) Which protocol does DHCP use at the Transport layer?

  1. IP
  2. TCP
  3. UDP
  4. ARP

Ans : UDP

(Q) What protocol does PPP use to identify the Network layer protocol?

  1. NCP
  2. ISDN
  3. HDLC
  4. LCP

Ans : NCP

(Q) An interconnected collection of piconet is called_______

  1. scatternet
  2. micronet
  3. mininet
  4. none of the mentioned

Ans : scatternet

(Q) Which of the following are uses of Computer Network ?

  1. All of these
  2. Powerful Communication Medium
  3. Providing High Reliability
  4. Resource Sharing

Ans : All of these

(Q) CAT5E Wire are STP cable_______

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : FALSE

(Q) RJ45 stands_______

  1. Registerd junction
  2. Registerd joint
  3. Registerd jack
  4. Registerd jacket

Ans : Registerd jack

(Q) Network HUB better than Switch_______

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : FALSE

(Q) Notebook computers with integrated Wi-Fi adapters_______

  1. FALSE
  2. TRUE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) BNC is Connector_______

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) Subnet Mask use in 'C' Class IP address_______

  1. 255
  2. 255.255.255
  3. 255.255
  4. None of this

Ans : 255.255.255

(Q) Through Network we cannot share a CD-RW_______

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : FALSE

(Q) Numbers of colors in cat 5 cable_______

  1. 4
  2. 6
  3. 7
  4. 8

Ans : 8

(Q) Which WLAN IEEE specification allows up to 54Mbps at 2.4GHz?

  1. A
  2. B
  3. G
  4. N

Ans : G

(Q) ___ mode network can send and receive in a single operation

  1. Half Duplex
  2. Full Duplex
  3. Duplex
  4. None of this

Ans : Half Duplex

(Q) CAT5E Wire are 8 wire and 4 pair_______

  1. Yes
  2. No
  3. N.A.
  4. N.A.

Ans : Yes

(Q) Computer Network can save lot of money on Resources such as printers,scanners.

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) A central computer surrounded by one or more computers is called_______

  1. ring network
  2. bus network
  3. star network
  4. all of above

Ans : star network

(Q) The first Network_______

  1. CNNET
  2. NSFNET
  3. ASAPNET
  4. ARPANET

Ans : ARPANET

(Q) STAR is a_______

  1. Topology
  2. Protocol
  3. OS
  4. N.A.

Ans : N.A.

(Q) Which command is used to upgrade an IOS on a Cisco router?

  1. copy tftp run
  2. copy tftp start
  3. config net
  4. copy tftp flash

Ans : copy tftp flash

(Q) On Ethernet adapters have unique hardware address coded into their_______

  1. Software
  2. Hardware
  3. Firmware
  4. None of this

Ans : Firmware

(Q) ADSL 'A' stands for_______

  1. Automatic
  2. Asimetric
  3. Audio
  4. Area

Ans : Area

(Q) What PPP protocol provides dynamic addressing, authentication, and multilink?

  1. NCP
  2. HDLC
  3. LCP
  4. X.25

Ans : LCP

(Q) Videotax is combination of_______

  1. communication
  2. television
  3. computer technology
  4. all of above

Ans : all of above

(Q) NETBUEI is a_______

  1. Command
  2. Protocol
  3. Valu
  4. Line

Ans : Protocol

(Q) How many broadcast domains are created when you segment a network with a 12-port switch?

  1. 1
  2. 2
  3. 5
  4. 12

Ans : 1

(Q) Bluetooth transceiver devices operate in ______ band.

  1. 2.4 GHz ISM
  2. 2.5 GHz ISM
  3. 2.6 GHz ISM
  4. 2.7 GHz ISM

Ans : 2.4 GHz ISM

(Q) Wi-Fi networks can connect to conventional Ethernet networks_______

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) Where is a hub specified in the OSI model?

  1. Session layer
  2. Physical layer
  3. Data Link layer
  4. Application layer

Ans : Physical layer

(Q) Frequency range 300 kHz to 3 MHz is used for_______

  1. AM radio transmission
  2. FM radio transmission
  3. TV radio transmission
  4. None of above

Ans : AM radio transmission

(Q) Ping is a command_______

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) Computer Consists of Multiple Computers !! State whether following statement is true or false ?

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) To check IP address which command are used_______

  1. Ping
  2. Config
  3. Del
  4. ipconfig

Ans : ipconfig

(Q) LANs in different locations can be connected together from_______

  1. WAN
  2. MAN
  3. Extranet
  4. Extranet

Ans : WAN

(Q) LAN tester used in network cable check_______

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) Insulated wires within a protective casing is called_______

  1. Coaxial cable
  2. Twisted pair cable
  3. Fiber optic
  4. None of this

Ans : Twisted pair cable

(Q) Which of the following is an example of a standard IP access list?

  1. access-list 110 permit host 1.1.1.1
  2. access-list 1 deny 172.16.10.1 0
  3. access-list 1 permit 172.16.10.1 255.255
  4. access-list standard 1.1.1.1

Ans : access-list 1 deny 172.16.10.1 0

(Q) Frames from one LAN can be transmitted to another LAN via the device_______

  1. Router
  2. Bridge
  3. Repeater
  4. Modem

Ans : Bridge

(Q) IP protocol is responsible for transporting data between network devices

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) Full form of ADSL is ?

  1. Automatic digital subscriber Line
  2. Asymmetric digital subscriber line
  3. Automatic Digital Static Line
  4. Automatic Digital Satellite Line

Ans : Asymmetric digital subscriber line

(Q) On _____ network every computer is equal and can communicate with any computer.

  1. Server
  2. Client
  3. Peer to Peer
  4. None of this

Ans : Peer to Peer

(Q) The domain name system is maintained by_______

  1. distributed database system
  2. a single server
  3. a single computer
  4. none of the mentioned

Ans : distributed database system

(Q) Manage and Unmanaged Two types of Ethernet Hub_______

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) Cross over cable use in connect more than two computers_______

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : FALSE

(Q) A DNS client is called_______

  1. DNS updater
  2. DNS resolver
  3. DNS handler
  4. none of the mentioned

Ans : DNS resolver

(Q) A program or a script to be run at client site are called_______

  1. Web Documents
  2. Common Documents
  3. Static Documents
  4. Active Documents

Ans : Active Documents

(Q) The file transfer protocol is built on_______

  1. data centric architecture
  2. service oriented architecture
  3. client server architecture
  4. none of the mentioned

Ans : client server architecture

(Q) 2600 series router are_______

  1. Dlink Router
  2. CISCO Router
  3. TP Link Router
  4. TP Link Router

Ans : CISCO Router

(Q) We can share Desktop through Remote Desktop option_______

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) What is the port number for NNTP?

  1. 119
  2. 80
  3. 79
  4. 70

Ans : 119

(Q) Three or more devices share a link in ________ connection

  1. Unipoint
  2. Multipoint
  3. Point to point
  4. None of the mentioned

Ans : Multipoint

(Q) CISCO Router are manageable ?

  1. YES
  2. NO
  3. N.A.
  4. N.A.

Ans : YES

(Q) A single piece of cable winds from station to station used in_______

  1. Ring
  2. Star
  3. Bus
  4. Tree

Ans : Bus

(Q) For established a LAN you must this device_______

  1. Hammer
  2. Plus
  3. Crimping tool
  4. Screw driver

Ans : Crimping tool

(Q) Internet is a example of_______

  1. MAN
  2. LAN
  3. WAN
  4. N.A.

Ans : WAN

(Q) ______ is the combination of informatics and telecommunication.

  1. Telematics
  2. Ethernet
  3. Telnet
  4. None of this

Ans : Telematics

(Q) The _____ world wide web is the most visible part of the world's largest network.

  1. Intranet
  2. Extranet
  3. Internet
  4. None of this

Ans : Internet

(Q) Which Class IP address is reserved for future development?

  1. A
  2. B
  3. D
  4. E

Ans : E

(Q) The smallest office network is referred to as a_______

  1. MAN
  2. WAN
  3. LAN
  4. None of this

Ans : LAN

(Q) In a network with dozens of switches, how many root bridges would you have?

  1. 1
  2. 2
  3. 5
  4. 12

Ans : 1

(Q) Which performs modulation and demodulation?

  1. Modem
  2. Fiber optic
  3. satellite
  4. coaxial cable

Ans : Modem

(Q) Bluetooth uses_______

  1. frequency hoping spread spectrum
  2. orthogonal frequency division multiplexing
  3. time division multiplexing
  4. none of the mentioned

Ans : frequency hoping spread spectrum

(Q) WPA2 is a Router wifi security system_______

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) IO means_______

  1. Input outdoor
  2. input output
  3. input outgoing
  4. N.A.

Ans : input output

(Q) Bluetooth is the wireless technology for_______

  1. local area network
  2. personal area network
  3. both (a) and (b)
  4. none of the mentioned

Ans : personal area network

(Q) MESH and STAR Topology are same_______

  1. YES
  2. NO
  3. N.A.
  4. N.A.

Ans : YES

(Q) An advantage of the three-tier architecture over the two-tier architecture is_______

  1. Easier maintenance
  2. Better control over the data
  3. Better performance
  4. All of the above

Ans : Better performance

(Q) The slowest transmission speeds are those of_______

  1. twisted-pair wire
  2. coaxial cable
  3. fiber-optic cable
  4. microwaves

Ans : twisted-pair wire

(Q) Active Directory used in_______

  1. Windows Server 2008
  2. Windows xp
  3. Windows 7
  4. Windows Vista

Ans : Windows Server 2008

(Q) HTTP uses a TCP connection to_______

  1. establish link between servers
  2. transfer whole database
  3. client server connections
  4. transfer files

Ans : transfer files

(Q) Transmission capacity of a media is called_______

  1. Bandwidth
  2. Media interference
  3. Duplex
  4. None of this

Ans : Bandwidth

(Q) For routes traffic between two Local area network we need_______

  1. Gateway
  2. Repeater
  3. Router
  4. None of this

Ans : Router

(Q) URL stands for_______

  1. Uniform Resource Loader
  2. Uniform Resource Line
  3. Uniform Resource Locator
  4. Uniform Resource Lighter

Ans : Uniform Resource Locator

(Q) Modulator and demodulator device name_______

  1. Router
  2. Repeater
  3. Modem
  4. None of this

Ans : Modem

(Q) we are transfer video data in local area network_______

  1. YES
  2. NO
  3. N.A.
  4. N.A.

Ans : YES

(Q) RJ45 is a connector_______

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) How long is an IPv6 address?

  1. 32 bits
  2. 128 bytes
  3. 64 bits
  4. 128 bits

Ans : 128 bits

(Q) Choose odd one_______

  1. Bus Hubs
  2. Enterprise Hubs
  3. low-end standalone hubs
  4. stackable hubs

Ans : Bus Hubs

(Q) Which of this is not a network edge device?

  1. PC
  2. Smartphones
  3. Servers
  4. Switch

Ans : Switch

(Q) Routing is done on which layer_______

  1. Datalink Layer
  2. Network Layer
  3. Session
  4. Presentation

Ans : Network Layer

(Q) First network which was made available_______

  1. IBMm Token Ring 1985
  2. Novell Netware
  3. IBM PC Network 1984
  4. DECNet 1980

Ans : DECNet 1980

(Q) On Client Server network security is High_______

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) Which command would you use to apply an access list to a router interface?

  1. ip access-list 101 out
  2. access-list ip 101 in
  3. ip access-group 101 in
  4. access-group ip 101 in

Ans : ip access-group 101 in

(Q) The PDC holds a second copy of the information that is stored on BDC_______

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : FALSE

(Q) At a time we are send and received data in same network_______

  1. TRUE
  2. FALSE
  3. N.A
  4. N.A

Ans : TRUE

(Q) Data Link Layer is responsible for delivering the data without errors to the next layer_______

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) Dynamic documents are sometimes referred to as_______

  1. client-site documents
  2. Active documents
  3. server-site dynamic documents
  4. None

Ans : server-site dynamic documents

(Q) The function of the DNS service is to resolve hostnames_______

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) 8088 is a port number_______

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) Which of the following items are not necessary for client/server?

  1. Assure that tools will connect with middleware.
  2. Understand the requirements.
  3. Determine network bandwidth capabilities.
  4. Include the use of a file server.

Ans : Include the use of a file server.

(Q) Which command displays RIP routing updates?

  1. show ip route
  2. debug ip rip
  3. show protocols
  4. debug ip route

Ans : debug ip rip

(Q) Multiplayer option use in Network Game_______

  1. TRUE
  2. FALSE
  3. N.A
  4. N.A

Ans : TRUE

(Q) Full form of DNS_______

  1. Domain naming system
  2. Domain news system
  3. Domain network system
  4. Domain new system

Ans : Domain naming system

(Q) Network switch connect _____ Mbps

  1. 10
  2. 20
  3. 100
  4. 150

Ans : 100

(Q) Crimping tools are used in cable punching_______

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) Speed of Gigabyte network type_______

  1. 10 Mbps
  2. 1000 Mbps
  3. 100 Mbps
  4. 10000Mbps

Ans : 1000 Mbps

(Q) The following is an example of scalability provided by a client-server approach with distributed processing_______

  1. Move some work from an overloaded server to a new server
  2. Move some work from an overloaded server to a client
  3. Move some work from a client to a server
  4. All of the above

Ans : All of the above

(Q) Server operating system name_______

  1. Windows 7
  2. Windows 8
  3. Server 2008
  4. None of this

Ans : Server 2008

(Q) Wildcard domain names start with label_______

  1. @
  2. *
  3. &
  4. #

Ans : *

(Q) Multiple users can contribute to a single document using collaboration features_______

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) _____ is the combination is the combined or data processing and telecommunication.

  1. Transmission
  2. Sharing
  3. Data communication
  4. None of this

Ans : Data communication

(Q) In star topology we need a_______

  1. Modem
  2. Hub
  3. Bluetooth
  4. Only Cable

Ans : Hub

(Q) A characteristic of a file server is which of the following?

  1. Acts as a fat client and is limited to one PC.
  2. Manages file operations and is shared on a network.
  3. Manages file operations and is limited to one PC.
  4. Acts as a fat client and is shared on a network.

Ans : Manages file operations and is shared on a network.

(Q) Which of the following is required to communicate between two computers?

  1. communications software
  2. protocol
  3. communications hardware
  4. All of the above

Ans : All of the above

(Q) _______is a Non - GUI client.

  1. Windows 3
  2. Windows NT 3.5
  3. Automatic Teller Machine
  4. MAC OS. X

Ans : Automatic Teller Machine

(Q) HTTP protocol for retrieving files from a local server_______

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : FALSE

(Q) In Windows NT have peer to peer networking capabilities built_______

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) A _____ is designed to share its resources among the client computers on the network.

  1. Peer to Peer
  2. Server
  3. Router
  4. None of this

Ans : Server

(Q) First network which was made available______

  1. IBMm Token Ring 1985
  2. Novell Netware
  3. IBM PC Network 1984
  4. DECNet 1980

Ans : DECNet 1980

(Q) LAN tester used in network cable check.

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) Crimping tools are used in cable punching.

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) ______ mode network can send and receive in a single operation.

  1. Half Duplex
  2. Full Duplex
  3. Duplex
  4. None of this

Ans : Half Duplex

(Q) Through Team Viewer software we can share computer through internet

  1. FALSE
  2. TRUE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) Internet-like networks within an enterprise. _______

  1. Intranets
  2. Switching alternating
  3. Inter organizational networks
  4. Extranets

Ans : Intranets

(Q) WWW can be grouped into broad categories are_______

  1. Static
  2. Dynamic
  3. Active
  4. All of them

Ans : All of them

(Q) Which of the following is required to communicate between two computers?

  1. Communications software
  2. Protocol
  3. Communications hardware
  4. All of the above

Ans : All of the above

(Q) In file transfer protocol, data transfer can be done in_______

  1. Stream mode
  2. Block mode
  3. Compressed mode
  4. All of the mentioned

Ans : All of the mentioned

(Q) Internet-like networks within an enterprise. ________

  1. Intranets
  2. Switching alternating
  3. Inter organizational networks
  4. Extranets

Ans : Intranets

(Q) DNS database contains________

  1. Name server records
  2. Hostname-to-address records
  3. Hostname aliases
  4. All of the mentioned

Ans : All of the mentioned

(Q) A _____ forwards data between IP networks

  1. Router
  2. Gateway
  3. Bridge
  4. None of this

Ans : Gateway

(Q) Wi-Fi networks can connect to conventional Ethernet networks.

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) WPA2 is a Router Wi-Fi security system.

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) 10.10.0.1 are ________ class IP address

  1. A
  2. B
  3. C
  4. D

Ans : A

(Q) Network HUB better than Switch.

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : FALSE

(Q) Bridge connects two Wide area network

  1. 2
  2. TRUE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) For established a LAN you must this device______

  1. Hammer
  2. Plus
  3. Crimping tool
  4. Screw driver

Ans : Crimping tool

(Q) ADSL "A" stands for______

  1. Automatic
  2. Asymmetric
  3. Audio
  4. Area

Ans : Area

(Q) Bluetooth uses______

  1. Frequency hopping spread spectrum
  2. Orthogonal frequency division multiplexing
  3. Time division multiplexing
  4. None of the mentioned

Ans : Frequency hopping spread spectrum

(Q) Router is network device.

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) Choose odd one______

  1. Bus Hubs
  2. Enterprise Hubs
  3. Low-end standalone hubs
  4. Stackable hubs

Ans : Bus Hubs

(Q) CAT5E Wire are 8 wire and 4 pair______

  1. 3
  2. 2
  3. N.A.
  4. N.A.

Ans : 3

(Q) Frequency range 300 kHz to 3 MHz is used for______

  1. AM radio transmission
  2. FM radio transmission
  3. TV radio transmission
  4. None of above

Ans : AM radio transmission

(Q) A central computer surrounded by one or more computers is called______

  1. Ring network
  2. Bus network
  3. Star network
  4. All of above

Ans : Star network

(Q) CISCO Router are manageable?

  1. YES
  2. NO
  3. N.A.
  4. N.A.

Ans : YES

(Q) Bluetooth transceiver devices operate in ______ band.

  1. 2.4 GHz ISM
  2. 2.5 GHz ISM
  3. 2.6 GHz ISM
  4. 2.7 GHz ISM

Ans : 2.4 GHz ISM

(Q) Multiple users can contribute to a single document using collaboration features.

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) Ping is a command.

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) Computer Network can save lot of money on Resources such as printers, scanners.

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) A single piece of cable winds from station to station used in______

  1. Ring
  2. Star
  3. Bus
  4. Tree

Ans : Bus

(Q) Bluetooth is the wireless technology for______

  1. Local area network
  2. Personal area network
  3. Both (a) and (b)
  4. None of the mentioned

Ans : Personal area network

(Q) CAT5E Wire are STP cable______

  1. 4
  2. 3
  3. N.A.
  4. N.A.

Ans : 3

(Q) An interconnected collection of Pico Net is called______

  1. Scatter net
  2. Micro net
  3. Mini net
  4. None of the mentioned

Ans : Scatter net

(Q) Notebook computers with integrated Wi-Fi adapters.

  1. FALSE
  2. TRUE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) Through Network we cannot share a CD-RW.

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : FALSE

(Q) RJ45 is a connector.

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) _____ exit as a portion of a company private network

  1. Internet
  2. Intranet
  3. Extranet
  4. None of this

Ans : Intranet

(Q) Computer Networks are highly reliable because of __________.

  1. Because of Multiple Computers
  2. None of these
  3. Alternate Sources of Data
  4. Resource Sharing

Ans : Alternate Sources of Data

(Q) BNC is Connector.

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) Computer Consists of Multiple Computers!! State whether following statement is true or false ?

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) _____is the combination is the combined or data processing and telecommunication.

  1. Transmission
  2. Sharing
  3. Data communication
  4. None of this

Ans : Data communication

(Q) A _____is a group of two or more computers that are sharing hardware and software

  1. Mobile
  2. Network
  3. Bluetooth
  4. None of this

Ans : Network

(Q) ____ is the combination of informatics and telecommunication.

  1. Telematics
  2. Ethernet
  3. Telnet
  4. None of this

Ans : Telematics

(Q) Every machine on Ethernet has a unique 48 bit address called_______

  1. IP address
  2. Network address
  3. MAC address
  4. None of this

Ans : MAC address

(Q) How long is an IPv6 address?

  1. 32 bits
  2. 128 bytes
  3. 64 bits
  4. 128 bits

Ans : 128 bits

(Q) In database management system, CAD is an abbreviation of_______

  1. Client devices access
  2. Compiler display application
  3. Control display application
  4. Computer aided design

Ans : Computer aided design

(Q) How many digits of the DNIC (Data Network Identification Code) identify the country_______

  1. First three
  2. First four
  3. First five
  4. First six

Ans : First three

(Q) DNS database contains_______

  1. Name server records
  2. Hostname-to-address records
  3. Hostname aliases
  4. All of the mentioned

Ans : All of the mentioned

(Q) HTML stands for_______

  1. Hypertext Markup Language
  2. Hypertext Markup Locator
  3. Hypertext Mixed Language
  4. Hypertext Markup Lines

Ans : Hypertext Markup Language

(Q) Full form of DHCP_______

  1. Dynamic Host Control police
  2. Dynamic Host Control profile
  3. Dynamic Host Control public
  4. Dynamic Host Control protocol

Ans : Dynamic Host Control protocol

(Q) Full form of ADSL is?

  1. Automatic digital subscriber Line
  2. Asymmetric digital subscriber line
  3. Automatic Digital Static Line
  4. Automatic Digital Satellite Line

Ans : Asymmetric digital subscriber line

(Q) Which of the following is not one of the advantages of parallel processing?

  1. Scale up
  2. Autonomy
  3. Speedup
  4. Availability

Ans : Autonomy

(Q) Which of the following items are not necessary for client/server?

  1. Assure that tools will connect with middleware.
  2. Understand the requirements.
  3. Determine network bandwidth capabilities.
  4. Include the use of a file server.

Ans : Include the use of a file server.

(Q) Full form of DNS________

  1. Domain naming system
  2. Domain news system
  3. Domain network system
  4. Domain new system

Ans : Domain naming system

(Q) Which command displays RIP routing updates?

  1. Show ip route
  2. Debug ip rip
  3. Show protocols
  4. Debug ip route

Ans : Debug ip rip

(Q) First network which was made available________

  1. IBMm Token Ring 1985
  2. Novell Netware
  3. IBM PC Network 1984
  4. DECNet 1980

Ans : DECNet 1980

(Q) For established a LAN you must this device________

  1. Hammer
  2. Plus
  3. Crimping tool
  4. Screw driver

Ans : Crimping tool

(Q) ______ is the combination of informatics and telecommunication.

  1. Telematics
  2. Ethernet
  3. Telnet
  4. None of this

Ans : Telematics

(Q) Computer Network can save lot of money on Resources such as printers, scanners.

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) Wi-Fi networks can connect to conventional Ethernet networks.

  1. TRUE
  2. FALSE
  3. N.A.
  4. N.A.

Ans : TRUE

(Q) CAT5E Wire are STP cable________

  1. 4
  2. 3
  3. N.A.
  4. N.A.

Ans : 3

(Q) A single piece of cable winds from station to station used in________

  1. Ring
  2. Star
  3. Bus
  4. Tree

Ans : Bus

(Q) How many digits of the DNIC (Data Network Identification Code) identify the country?

  1. First three
  2. First four
  3. First five
  4. First six

Ans : First three

(Q) Which of the following is required to communicate between two computers?

  1. Communications software
  2. Protocol
  3. Communications hardware
  4. All of the above

Ans : All of the above