Vous êtes sur la page 1sur 10

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Select The Blank


Question An effective way to analyze the problem is a ________.

Correct Answer Flowchart

Your Answer Flowchart

True/False
Question Data can be lost if a transmission error is encountered on a network.

Correct Answer True

Your Answer True

True/False
Question VoIP is likely to take over the traditional phone system.

Correct Answer True

Your Answer True

Multiple Choice Multiple Answer


Question When a ring topology is configured on a network it usually ?

Correct Answer Involves high cost , Complex in nature , Difficult to trouble shoot

Your Answer Involves high cost , Complex in nature , Difficult to trouble shoot

Multiple Choice Single Answer


Question The layout and connection of computers in a network is called:

Correct Answer Network Topology

Your Answer Network Topology

Multiple Choice Single Answer


Question Nodes involved in routing process is limited to forwarding data packets based on

Correct Answer Internal information

Your Answer IP address

Select The Blank


Question The single interface protocol creates a ________ environment.

Correct Answer User friendly

Your Answer Unpredictable

Multiple Choice Multiple Answer


Question A gateway can be used to interconnect systems with different

Correct Answer Protocols , Languages , Architecture

Your Answer Protocols , Languages , Architecture


LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Multiple Choice Multiple Answer
Question Systems which can be integrated with the home phone are

Correct Answer Digital video recorder , Digital subscription TV , Home security system

Your Answer Digital video recorder , Digital subscription TV , Home security system

Multiple Choice Single Answer


Question The Photographs in digital cameras are stored in :

Correct Answer Memory

Your Answer Memory

Multiple Choice Single Answer


Question Infrared can be used in transmission of data through :

Correct Answer Wireless

Your Answer Wireless

Select The Blank


Question ________ software enables one computer to communicate with other
computer.
Correct Answer Protocol

Your Answer Protocol

Multiple Choice Single Answer


Question What should be done to increase the exposure and vulnerability of a
computer ?
Correct Answer Connect to net

Your Answer Increase RAM

Multiple Choice Multiple Answer


Question A computer program usually refers to a

Correct Answer Logical Sequence , Set of Instructions , Functional unit

Your Answer Set of Instructions

Select The Blank


Question A Network topology is majorly concerned with the ________ arrangement
of computers in a network.
Correct Answer Physical

Your Answer Physical

Multiple Choice Single Answer


Question Which modems are prefered in VoIP computer to computer connection ?

Correct Answer DSL

Your Answer DSL


LIST OF ATTEMPTED QUESTIONS AND ANSWERS
True/False
Question To access the world wide web you must
use a operating software.
Correct Answer False

Your Answer False

Multiple Choice Single Answer


Question The recipient decrypts the message
received by using his own:
Correct Answer Private Key

Your Answer Private Key

Select The Blank


Question Carrier sense means that each station
listens to ________ prior to transmitting.
Correct Answer Cable

Your Answer Cable

Select The Blank


Question A ________ attack occurs when an
outsider tries to be part of your network or
legal terminal.
Correct Answer IP spoofing

Your Answer IP spoofing

True/False
Question In parity checking if external interference
introduces an error all the bits will be
changed to zero.
Correct Answer False

Your Answer False

Select The Blank


Question CSMA/CA media access method is used
on ________ networks.
Correct Answer Apple

Your Answer Apple

Select The Blank


Question The key feature of a router is its capacity
to determine the ________ path to the
destination.
Correct Answer Shortest

Your Answer Cost effective

Multiple Choice Single Answer


Question A lost token error occurs when a token
Total no of wrong ans =5 where last quests ans is wrong
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
True/False
Question Digital computers are programmable machines.
Correct Answer True
Your Answer True

Multiple Choice Multiple Answer


Question Hardware components of a personal computer
will consist of a
Correct Answer Hard Disk , Mouse , Floppy
Your Answer Hard Disk , Mouse , Floppy

Multiple Choice Multiple Answer


Question What additional features are present in
JavaScript which were not present in HTML.
Correct Answer Moving tickers , Drop-down menus , Mouse-over
interactions
Your Answer Drop-down menus , Mouse-over interactions

Multiple Choice Single Answer


Question Producing documents over the web is done
using
Correct Answer Hypertext markup language
Your Answer Hypertext markup language

Select The Blank


Question Flowcharts usually help the programmers to
establish healthy communication channel with
the ________.
Correct Answer Business Managers
Your Answer None of the Above

Select The Blank


Question The WWW is a system of internet servers that
support ________ to access several internet
protocols on a single interface.
Correct Answer Hypertext
Your Answer Hypertext

Multiple Choice Single Answer


Question A software application that uses a network
adapter card to send packets over a LAN is
called :
Correct Answer Packet sniffer

Vous aimerez peut-être aussi