Computer Networks & Internet GK in Hindi

Computer Networks & Internet

  1. In a TCP header source and destination header contains:
    (a) 8 bit
    (b) Automatic repeat request
    (c) Automatic request repeat
    (d) Acknowledgement repeat request
  2. A confirmed service is defined with a:
    (a) Request
    (b) Ship
    (c) PPP
    (d) All  of these
  3. A number of transmission media exits, some of them  are:
    (a) Twisted pair cables
    (b)  Layers
    (c) Both (a) and (b)
    (d) None of these
  4. A remote access server also known as: ………………
    (a) Communication
    (B) Out system interface
    (c) Open system  interconnection
    (D) Out system interconnection
  5. A ring interface can operate different modes:
    (a) Listen mode 

    (b) Single  attachment station
    (c) Single attached station
    (D) None of these
  6. A stream of data is  called  a:
    (a) Token 
    (b) Not so old protocol
    (c) Newly established protocol
    (d) None of these
  7. A token ring is a ring topology created by IBM in:
    (a) 1960
    (b) Connection oriented service
    (c) Both (a) and (b)
    (d) None of these
  8. A transceiver is used to connect a ……….
    (a) Coaxial cable
    (b) Content
    (c) Function
    (d) All of these 
  9. All stations in a thick Ethernet is connected to a:
    (a) Twisted pair cable
    (b) Cable supports a max distance of 500 meters
    (c) Max distance covered by a network using Ethernet is 2.5km
    (d) All of these 
  10. Data can be arbitrarily…………………
    (a) Long
    (b) Physical Medium distance
    (c) Physical media dependent
    (d) permitting medium dependent
  11. During communication, a channel that is noisy may causes:
    (a) From loss of bits a frame
    (b) operating system
    (c) Web browser
    (d) Modem
  12. Each cable is connected to a Ethernet cable through a:
    (a) Repeater
    (b) JSP
    (c) ASP
    (d) PHP 
  13. Ethernet transmit and services data at a spped of ……………..
    (a) 5 million bits per second
    (b) TCP
    (c) FTP
    (d) HTTP
  14. A group of station connected to a cable forms a:
    (a) Repeater
    (b) Network active upstream nieghbour
    (c) Network administrator upstream neighbour
    (d) None of these
  15. A repeater consists of …………. transceiver:
    (a) 1
    (b) Trunk line, cellular telephone
    (c) Specialized radio links
    (d) All of these
  16. A special eight-bit sequence …………
    (a) 11111111
    (b) Network software
    (c) Protocol
    (d) None of these
  17. A user connects to NAS through:
    (a) ASDL
    (b) High bandwidth
    (c) Good immunity to the electromagnetic interference
    (d) All of these
  18. An unconfirmed is defined with a:
    (a) Request
    (b) Layer protocol
    (c) Network
    (d) None of these
  19. ARQ stand for:
    (a) Array repeat request
    (b) Supporting rules for now-level signaling
    (c) Hardware implementation
    (d) All of these
  20. BNC stands for:
    (a) Bayonet NEIL connection
    (b) 1,2,3,4
    (c) 1,2,3,4,5
    (d) 2,3,4,5,6
  21. Data exchange can tack place between any ……………. workstations.
    (a) 1
    (b) Universal resource locator
    (c) Uniform radio locator
    (d) None of these
  22. Ethernet is the …………….. expensive high speed lan alternative:
    (a) More
    (b) Parallel
    (c) AGP
    (d) All of these
  23. FCS stands for:
    (a) Frame check system 
    (b) Port
    (c) Gateways
    (d) Protocol
  24. For copper media, which PMD is used:
    (a) TP-PMD

    (b) 200 meters
    (c) 250 meters
    (d) 300 meters
  25. For terminate PPP, the four steps are :
    (a) Link establishment
    (b) Yellow house 
    (c) Black hose
    (d) None of these
  26. How many modes a ring interface can operate:
    (a) 1
    (b) Talk mode
    (c) Both (a) and (b)
    (d) None of these  
  27. IEEE 802.2 standard works on ………….modes. 
    (a) Connectionless
    (b) AUI (attachment unit interface)
    (c) LAN 
    (d) MAN 
  28. If the calling peer has an IP address, it tells the:
    (a) Called peer what it is 
    (b) Coaxial cable 
    (c) CSMS/CD
    (d) Transceiver 
  29. The ATM networks are:
    (a) Connection-less service 
    (b) Data over IP 
    (c) Both (a) and (b) 
    (d) None of these 
  30. The characteristic of each layer are:
    (a) Name 
    (b) Half duplex 
    (c) Full duplex
    (d) Single duplex 
  31. The characteristics of the thick Ethernet cable are:
    (a) Provides connectivity to max of 1024 stations
    (b) Shielded twisted pair
    (c) System twisted panel 
    (d) Subscriber twisted protocol 
  32. The lower layers are layers are:
    (a) 1,2,3
    (b) The cost of satellite communication is quite High
    (c) Security must be imposed through encryption 
    (d) All of these 
  33. The physical layers are:
    (a) PMD
    (b) 56 KBPS
    (c) 64 KBPS
    (d) 128 KBPS
  34. In physical layer of token ring, signal speed of this media is:
    (a) 1 MBPS
    (b) 1516 BYTES
    (c) 1517 BYTES
    (d) 1518 BYTES 
  35. In which method we can connect to internet:
    (a) DIAL-UP 
    (b) DATA-LINK LAYER
    (c) Both (a) and (b)
    (d) None of these 
  36. Network is the term used for a group of :
    (a) Protocol 
    (b) 3 
    (c) 4 
    (d) 6
  37. A homepage is…………………
    (a) An index of encyclopedia articles 
    (b) Where all internet data is stored 
    (c) Required for access to the internet
    (d) The first page of a website
  38. All normal Webpages consist of what two parts?
    (a) Head and body 
    (b) Where all internet data is stored 
    (c) Required for access to the internet
    (d) Both (b) and (c) 
  39. What is the correct html for adding a background color?
    (a) Body color = yellow tag
    (b) Body bgcolor = yellow tag
    (c) Background tag yellow / background tag
    (d) Body background = yellow tag
  40. What is the correct html tag for inserting a line break ?
    (a) BR tag
    (b) LB tag
    (c) Break tag
    (d) Newline tag
  41. The communication at the network layering the internet is:
    (a) Connectionless
    (b) Connection Oriented 
    (c) Both 
    (d) None of the above
  42. The computer Society of the IEEE started a project in:
    (a) 1970
    (b) 1975
    (c) 1980
    (d) 1985
  43. The concept of Wavelength is equivalent to the :
    (a) Bit rate
    (b) Bandwidth
    (c) Amplitude 
    (d) Bit length
  44. The encrypted security payload extension header is new in :
    (a) Ipv4
    (b) Ipv5
    (c) Ipv6
    (d) None
  45. The Ethernet frame contains :
    (a) 3 Fields 
    (b) 5 Fields 
    (c) 7 Fields 
    (d) 9 Fields 
  46. The example of an analog conversion is :
    (a)  Radio
    (b) Video
    (c) Television
    (d) Internet 
  47. The first fragment has an offset value of : 
    (a) 10
    (b) 5
    (c) 2
    (d) 0
  48. The L band has the bandwidth of :
    (a) 10 mhz
    (b) 15 mhz
    (c) 20 mhz
    (d) 25 mhz
  49. The level of energy is almost same in the :
    (a) Wireless Network 
    (b) Wired Network 
    (c) Wi-Fi Network 
    (d) DSL Network 
  50. The loop in the flooding process eliminated by :
    (a) ISP
    (b) RFC
    (c) RPF
    (d) SMTP 
  51. Satellites Process microwaves with bidirectional antennas called :
    (a) Line of Signals
    (b) Line of Sight 
    (c) Line of Direction
    (d) Line of Stations
  52. SCTP Protocol Combines the best features of :
    (a) UDP
    (b) SMTP
    (c) TCP 
    (d) Both (a) and (c) 
  53. SN stands for :
    (a) Sequence nodes
    (b) Sequence numeric
    (c) Sequence number 
    (d) Sequence notes 
  54. SNR (signal to noise ratio) is equals to:
    (a) Avg signal power / Avg noise power 
    (b) Avg signal power / Avg distortion 
    (c) Avg noise power / Attenuation 
    (d) Avg Attenuation / Avg distortion 
  55. Telephone networks use :
    (a) Message switching 
    (b) Packet switching
    (c) Circuit switching 
    (d) None 
  56.  TFTP stands for :
    (a) Trivial File Transfer Path
    (b) Trivial File Transfer Packet 
    (c) Trivial File Transfer Protocol 
    (d) Trivial File Transformed Protocol
  57. The Application Adaptation Layer 2 (AAL2) is used for :
    (a) High bit  rate traffic
    (b) Low bit rate  traffic
    (c) Slow traffic 
    (d) Fast traffic  
  58. The cable modem is similar to:
    (a) High-bit-rate digital  subscriber 
    (b) Asymmetric DSL
    (c) Very high-bit-rate digital subscriber line
    (d) Asymmetric DSL lite  
  59. The Cryptography can  provide :
    (a) Entity authentication 
    (b) Nonrepudiation  of messages 
    (c) Confidentiality 
    (d) All of them
  60. The  cyclic codes are fast when these are  implemented in :
    (a) Software 
    (b) Hardware
    (c) Local area network 
    (d) Wide area network 
  61. The bandwidth is proportional  to  the :
    (a) Baud  rate

    (b) Data  rate 
    (c) Delay rate 
    (d) Bit rate 
  62. The bandwidth of analog switched service in between :
    (a) 300 and 3300 Hz
    (b) 0 and 4000 Hz
    (c) 600 to 3000 Hz
    (d) 2400 Hz  
  63. The baseband  is  roughly equivalent to the MAC sub layer  in :
    (a) Wans 
    (b) Lans 
    (c) Bluetooth
    (d) Wi-Fi 
  64. The ciphers of today  are  called :
    (a) Substitution Cipher 
    (b) Round  Ciphers 
    (c) Transposition Cipher 
    (d) None of  above 
  65. The  coaxial  cable has bandwidth that ranges from :
    (a) 5-750 mhz
    (b) 10-300 mhz
    (c) 5-550 mhz
    (d) 10-3000 mhz
  66. The collision may result in :
    (a) Save  Data
    (b) Retrieve Data
    (c) Destroyed Data
    (d) Encrypt Data
  67. The combination of two of more  topologies are called :
    (a) Star
    (b) Bus
    (c) Ring 
    (d) Hybrid 
  68. The FTP uses the services of :
    (a) TCP
    (b) UDI
    (c) SMTP 
    (d) DDNS 
  69. The functions of the  data link control includes :
    (a) Framing 
    (b) Flow and error control 
    (c) Software implemented  protocols 
    (d)  All of the above 
  70. The Data Encryption standard (DES) was designed by :
    (a) Microsoft 
    (b)  Apple 
    (c) IBM 
    (d) None 
  71. The  data rate  depends upon :
    (a) Bandwidth
    (b) Level  of signals 
    (c) Level of noise 
    (d) All of the above 
  72. The data link layer is  responsible  for :
    (a) Nond-to-node-delivery 
    (b) Host-to-host-delivery
    (c)  Process to process delivery 
    (d) None of the given  
  73. MUltiple-access protocol is divided into:
    (a) Two categories 
    (b) Three catagories 
    (c) Four categories 
    (d) Five categories 
  74. PPP is a:
    (a) Byte-oriented protocol 
    (b) Connection-oriented protocol 
    (c) Connectionless protocol 
    (d) None of the above 
  75. Privacy and anti jamming can be achieved by :
    (a) Multiplexing 
    (b) Spreading 
    (c) Both (a) and (b) 
    (d) None of the above 
  76. RSA Stands for :
    (a) Rivest, Shamir, Adleman 
    (b) Roger, Shamir, Adrian 
    (c) Robert, Shamir, Anthoney 
    (d) Rivest, Shaw, Adleman
  77. RPF stands for :
    (a) Reverse path forwarding 
    (b) Reverse path failure 
    (c) Reverse packet forwarding 
    (d) Reverse protocol failure 
  78. QOS stand for :
    (a) Quality of service 
    (b) Quantity of signals 
    (c) Quality of signals 
    (d) Quantity of service 
  79. Passive Hubs are actually a :
    (a) Simple switch 
    (b) Gateway 
    (c) Connector 
    (d) Router 
  80. MTA stands for :
    (a) Message transmission agent
    (b) Message transfer agents
    (c) Message transfer agent 
    (d) Message transfer again 
  81. A switch in a datagram network uses a :
    (a) Destination address
    (b) Sender address
    (c) Routing table
    (d) Header 
  82. A Van Allen belt is a layer that contains:
    (a) Charged Signal 
    (b) Charged Station 
    (c) Charges Particles 
    (d) Charged 
  83. ABR stands for :
    (a) Average Bit Rate
    (b) Available Bit Rate 
    (c) Available Byte Rate 
    (d) Average Byte Rate 
  84. ACL stands for :
    (a) Asynchronous Connectionless Link 
    (b) Asynchronous Connection Link 
    (c) Asynchronous Connection Link 
    (d) Asynchronous Communicated Link 
  85. All ATM Station have :
    (a) Broadcast/Unknown Server 
    (b) LAN Emulation Configuration Server 
    (c) LAN Emulation Client 
    (d) LAN Emulation Client 
  86. At the transport layer, TCP/IP defined :
    (a) Transmission Control Protocol 
    (b) User Datagram Protocol 
    (c) Stream Control Transmission Protocol 
    (d) All of the above 
  87. Attenuation, distortion and noise are types of :
    (a) Bandwidth
    (b) Composite signals 
    (c) Transmission Impairments 
    (d) None of the above
  88. Average datarate is equal as ……….
    (a) Amount of data/amount of interties sent. 
    (b) Amount of data/time 
    (c) Time/amount of data 
    (d) None of the above
  89. Baseline wandering is prevented by the :
    (a) Scrambling technique 
    (b) Block coding scheme
    (c) Line coding scheme 
    (d) None of the above 
  90. Communication at the network layer in the internet is:
    (a) Connectionless 
    (b) Switchless 
    (c) Dataless
    (d) IP less
  91. GFC stands for:
    (a) Generic Flow control 
    (b) Generic Flow cell 
    (c) Generic Flow coordinate 
    (d) Generic Frame control 
  92. Gigabit Ethernet is also Known as the:
    (a) Standard 802.3u
    (b) Standard 802.3z
    (c) Standard 802.3s
    (d) Standard 802.3y
  93. Global and local addressing are types of :
    (a) WAN network 
    (b) Local area circuit network 
    (c) Virtual-circuit network 
    (d) MAN network 
  94. Global positioning Service (GPS) uses 24 satellites in :
    (a) 9 Orbits 
    (b) 8 Orbits 
    (c) 7 Orbits 
    (d) 6 Orbits 
  95. Global Positioning System (GPS) is an example of:
    (a) GEO 
    (b) MEO 
    (c) LEO 
    (d) SEO 
  96. Global star communication requires both satellites and :
    (a) Base Stations 
    (b) Network Stations 
    (c) Orbit Stations 
    (d) Earth Stations 
  97. GSM stands for :
    (a) Global System for Mobile 
    (b) Global Situation for Mobile 
    (c) Global Signal for Mobile 
    (d) Global Station for Mobile 
  98. In the Internet model, the port number are:
    (a) 16 – bit integers 
    (b) 18 – bit integers 
    (c) 20 – bit integers 
    (d) 22 – bit integers 
  99. In the shortest path tree, root of a tree is a:
    (a) Station
    (b) IP 
    (c) Link 
    (d) Node 
  100. MIB Stands for:
    (a) Management Information Bytes
    (b) Management Information Board 
    (c) Management Information Base 
    (d) Management Information Bit 
  101. Microwaves having frequency between :
    (a) 1 and 300 ghz 
    (b) 3 khz and 1 ghz 
    (c) 300 khz and 1 ghz 
    (d) 1 ghz and 300 ghz 
  102. Session Initiation Protocol (SIP), is very :
    (a) Independent 
    (b) Flexible 
    (c) Important 
    (d) Layered 
  103. Shielded Screen Twisted pair is used the data rate of :
    (a) 100 Mbps 
    (b) 125 Mbps 
    (c) 200 Mbps 
    (d) 600 Mbps 
  104. Signal rate is also called the :
    (a) Pulse rate 
    (b) Modulation rate 
    (c) Baud rate 
    (d) All of the above 
  105. TCP processes at the :
    (a) Physical layer 
    (b) Data link layer 
    (c) Sessional layer 
    (d) Application layer 
  106. TCP, unlike UDP is a :
    (a) Connectionless protocol 
    (b) Stream – Oriented protocol 
    (c) Connection Oriented protocol 
    (d) None of the above 
  107. TDM is used to combine :
    (a) Analog Signals 
    (b) Digital Signals 
    (c) Both A and B 
    (d) None of the above 
  108. Teledesic has :
    (a) 40 Satellites 
    (b) 92 Satellites 
    (c) 176 Satellites 
    (d) 288 Satellites 
  109. The Asymmetric DSL is used the line code of :
    (a) DMT 
    (b) 2BIQ
    (c) T-1 line 
    (d) None 
  110. Internet was originally a project of which agency :
    (a) ARPA 
    (b) Ad-on 
    (c) Tutorial 
    (d) Patch 
  111. Which of the following is a correct format of e-mail address ?
    (a) Name@website@info
    (b) Name@website.info 
    (c) www.nameofwebsite.com
    (d) Name website.com 
  112. HTML is used to Create…………..
    (a) Machine Language Program
    (b) High Level Program 
    (c) Web Page
    (d) Web server 
  113. IP means :
    (a) Internet Provider 
    (b) Internet Protocol 
    (c) Internet Procedure 
    (d) Internet Processor 
  114. Website front Page is called :
    (a) Browser Page 
    (b) Search Page 
    (c) Home Page 
    (d) Book Mark 
  115. Which one of the following is not a search engine ?
    (a) Bing 
    (b) Google 
    (c) yahoo 
    (d) Windows 
  116. Internet explorer falls under :
    (a) OS
    (b) Compiler
    (c) Browser
    (d) IP Address
  117. Common element which describe the web page is :
    (a) Heading 
    (b)  Paragraph
    (c) List 
    (d) All 
  118. Which of the following tag is used to mark a beginning of paragraph ?
    (a) <TD>
    (b) <Br>
    (c) <B>
    (d) <P>
  119. From which tag descriptive list starts ?
    (a) <LL>
    (b) <DD>
    (c) <DL>
    (d) <DS>
  120. correct HTML tag for the largest heading is :
    (a) <Head>
    (b) <h6>
    (c) <heading>
    (d) <hi>
  121. The attribute of <form> tag :
    (a) Method 
    (b) Action 
    (c) Both (a) and (b) 
    (d) None 
  122. Which of the following is a container ?
    (a) <Select>
    (b) <Value>
    (c) <Input>
    (d) <Body>
  123. The tag in HTML are :
    (a) Not case sensitive 
    (b) Browser dependent 
    (c) Case sensitive 
    (d) None
  124. HTML is :
    (a) Scripting Language 
    (b) Markup Language
    (c) Programming Language 
    (d) Network Protocol 
  125. HTML Use:
    (a) User defined tag
    (b) Pre-specified tag
    (c) Fixed tag defined by language
    (d) Tag for only linking 
  126. Java script is …….. language:
    (a) Programming 
    (b) scripting 
    (c) Application 
    (d) None of these 
  127. Java script is …………language :
    (a) Server
    (b) None 
    (c) ISP
    (d) Browser
  128. Java script is designed for following purpose :
    (a) To style HTML pages
    (b) To perform server side scripting operation
    (c) To add interactivity to HTML pages
    (d) To execute query related to DB
  129. Java Script is can be written :
    (a) Directly in .js file & included into Html
    (b) Directly on server script
    (c) Both (a) and (b)
    (d) None of these 
  130. Java Script is an ………. language :
    (a) Complied 
    (b) Non 
    (b) Interpreted 
    (d) Both
  131. Cost for using Java script in you HTML is ……….
    (a) Free 
    (b) $ 15/year
    (c) $ 10 /year 
    (d) $ 5 / year 
  132. Java Script is:
    (a) Subjective 
    (b) Objective
    (c) Evil 
    (d) Object based 
  133. How do you create an object in Java Script :
    (a) Var obj = { };
    (b) Function Foo () {} var obj = Foo ();
    (c) All
    (d) Var obj = new object ();
  134. What is the Value of following experssion 8/3 ?
    (a) 5
    (b) 2 
    (c) 24 
    (d) Error 
  135. How to Concatenate multiple string ?
    (a) ‘One’ +’two’ + ‘three’
    (b) ‘One Concat (‘two’ – ‘three’)
    (c) Both (a) and (b) 
    (d) None
  136. Why Java Script & Java have smilar name ?
    (a) Java Script is a stripped down version of java
    (b) Java script syntax is loosely based on java 
    (c) They both originated on the island of java 
    (d) None
  137. …………………..Java Script is also called client-side java script. 
    (a) Microsoft 
    (b) Navigator 
    (c) Livewire 
    (d) Native 
  138. What are variables used for java script program ?
    (a) Storing number, dates or other value
    (b) Varying randomly 
    (c) Causing high school algebra
    (d) None of the above
  139. Which of the following attribute can hold the java script version ?
    (a) Language 

    (b) Script 
    (c) Version 
    (d) None 
  140. What is the correct java script syntax ?
    (a) System.outprint in (” “)
    (b) Printin (” “)
    (c) Document. Write (” “)
    (d) Response. Write (” “)
  141. Inside which HTML element do we put the Java Script. 
    (a) <US>
    (b) <Scripting>
    (c) <Script>
    (d) <Java Script>
  142. Java Script entities start with ………. and end with…………….
    (a) Semicolon, Colon
    (b) Semicolon, Ampersand 
    (c) Ampersand, colon
    (d) Ampersand, Semicolon
  143. Choose the Server side java script object :
    (a) File upload 
    (b) Function 
    (c) File 
    (d) Date 
  144. Java Script is interpreted by…………..
    (a) Client 
    (b) Server 
    (c) Object 
    (d) None 
  145. E-business stands for : 
    (a) Electronic business 
    (b) Electron business 
    (c) Electric business
    (d) All 
  146. B2B stand for:
    (a) Business to Government 
    (b) Business to Consumer 
    (c) Business to Business 
    (d) All 
  147. Internet has :
    (a) Empowered Consumer and business alike 
    (b) Empowered business only 
    (c) Empowered inter me diaries only 
    (d) Empowered consumer only 
  148. e-business require :
    (a) Accessibility to Network 
    (b) Accessibility to Computers 
    (c) Access to Markets 
    (d) All of the above
  149. E-bay is good example to define :
    (a) B 2 B
    (b) B 2 B
    (c) C 2 C
    (d) G 2 C
  150. …………… is on example of an auction site :
    (a) e-bay
    (b) ibibo
    (c) facebook 
    (d) orkut 
  151. A Credit card contains cash :
    (a) True 
    (b) False 
    (c) Maybe 
    (d) None 
  152. A debit card contains cash :
    (a) True 
    (b) False 
    (c) Maybe 
    (d) None
  153. TCP/IP is a :
    (a) Network to Host Layer 
    (b) Network Software 
    (c) Protocol 
    (d) None of these 
  154. Which is the lowest layer of TCP/IP mode :
    (a) Host to Host layer 
    (b) Network Access Layer 
    (c) Internet Layer 
    (d) Application 
  155. TCP/IP mainly used for :
    (a) File Transfer Program 
    (b) File Transmission Protocol 
    (c) File Transfer Protocol 
    (d) None of these 
  156. What is FTP full stand for ?
    (a) File Transfer Program 
    (b) File Transmission Protocol 
    (c) File Transfer Protocol 
    (d) None of these 
  157. In which layer of OSI model IP is available :
    (a) Layer 1
    (b) Layer 2
    (c) Layer 3
    (d) Layer 4
  158. What does IRC stand for :
    (a) Internet Relay Chat 
    (b) International Relay of Characters 
    (b) International  Remote Conversations
    (d) International Remote Characters
  159. Which is not the applicable of internet :
    (a) Communication
    (b) Banking 
    (c) Shopping 
    (d) Sleeping 
  160. Which is the advantage of e-business :
    (a) Better Service 
    (b) Reduction of cost 
    (c) Reduction of Paper work 
    (d) All of these 
  161. WWW stands for ………?
    (a) Work Wide Web
    (b) World Wide Web 
    (c) Word Wide Web 
    (d) All of these 
  162. WAIS is stand for…………:
    (a) World Area Information System 
    (b) Wide Analog Information System 
    (c) Wide Area Information System 
    (d) Wide Area Internal System 
  163. Another name for Usenet is :
    (a) Gopher 
    (b) Newsgroups 
    (c) Browser 
    (d) CERN.
  164. The Maximum Speed of Modem is:
    (a) 32 kbps 
    (b) 56 kbps  
    (c) 64 kbps 
    (d) 128 kbps 
  165. PDA stand for………..:
    (a) Portable Data Assistant
    (b) Personal Digital Assistant 
    (c) Personal Data Assistant 
    (d) All of the above
  166. How many level of Connectivity.
    (a) 1
    (b) 2
    (c) 3
    (d) 4
  167. ISDN stand for………..:
    (a) Integrated Service Digital Network 
    (b) International Services  for Digital Network
    (c) Integrated Services for Digital Networking 
    (d) Integrated Services of Digital Network.
  168. MAN is stand for……………
    (a) Metropolitan Area Network 
    (b) Mount Area Network 
    (c) Merge Area Network 
    (d) Mega Area Networking. 
  169. Which is not part of Active Attacks ?
    (a) Denial of service 
    (b) Modification of messages
    (c) Replay attack 
    (d) Traffic Analysis
  170. Which is not a type of a client ?
    (a) Thin client 
    (b) Hybrid client 
    (c) Guest client 
    (d) Fat client
  171. ……………..are hardware and software combination that connect devices running different native protocols. 
    (a) Protocols
    (b) Models 
    (c) Gateways 
    (d) Ports. 
  172. Which network architecture is developed by IBM ?
    (a) System Network Architecture 
    (b) Digital Network Architecture 
    (c) Boroughs Network Architecture 
    (d) Distributed Network Architecture.
  173. Which is the IP source rouling method :
    (a) SSR
    (b) LSR
    (c) LLR
    (d) Both (a) & (b) 
  174. RDP server runs on:
    (a) computers 
    (b) Switches 
    (c) Routers 
    (d) Servers.
  175. What is the name of the network topology in which there are bi-directional links between each possible node ?
    (a) Ring
    (b) Star
    (c) Tree
    (d) Mesh 
  176. Which is the chatting application :
    (a) Yahoo messenger 
    (b) Google earth 
    (c) You tube 
    (d) None of these 
  177. Who provide us internet :
    (a) TCP 
    (b) ISP 
    (c) FTP 
    (d) HTTP 
  178. OSI stands for :
    (a) Open System Interface 
    (b) Out System Interface 
    (c) Open System Interconnection 
    (d) Out System Interconnection 
  179. Which layer of OSI determines the interface of the system with the user ?
    (a) Session 
    (b) Data-link 
    (c) Application
    (d) Network 
  180. Which is not the search engine :
    (a) Alavista.com
    (b) Google.com 
    (c) Facebook.com
    (d) Yahoo.com 
  181. MIME stand for………..
    (a) Multinational Internal Mail Extension 
    (b) Multipurpose Internet Mail Extension 
    (c) Multitask International Mail Extension 
    (d) None of the above 
  182. Which of the following is a properly formatted email address ?
    (a) Paul.trigg@domain.org.uk 
    (b) paul.trigg@domain.org.uk 
    (c) paul.domain.uk 
    (d) None of the above 
  183. What is a disadvantage of joining a mailing list ?
    (a) Receiving messages automatically form anyone in the group 
    (b) People discussing a topic of interest globally
    (c) High volumes of email
    (d) All of the above.
  184. What does HTML stand for ?
    (a) Hyper Textual Mark-up Lingo 
    (b) hyperlink Text Marking Language 
    (c) Hyper Text Mark-up Language
    (d) Hyper text Mini Language.
  185. Congestion control is done at……………:
    (a) Transport Layer 
    (b) Network Layer 
    (c) Application Layer 
    (d) Data Link Layer.
  186. Which protocol is used for browsing website :
    (a) TCP 
    (b) HTTP 
    (c) FTP 
    (d) TFTP. 
  187. In HTTP ‘s’ is stands for :
    (a) Simple 
    (b) Server 
    (c) secured 
    (d) None of these.
  188. How many types of Website ?
    (a) 1
    (b) 3
    (c) 2
    (d) 4
  189. W3C is stand for…………?
    (a) World Wide Web Contract
    (b) World Wide Web Consortium 
    (c) World Wide Web Constent. 
    (d) None of these.
  190. Which is the threat for clients :
    (a) TCP 
    (b) IP 
    (c) ICMP 
    (d) SMTP. 
  191. Which Protocol is used to report error message ?
    (a) TCP 
    (b) IP 
    (c) ICMP 
    (d) SMTP.
  192. Which is the false statement ?
    (a) TCP enable dataflow for monitoring
    (b) It avoid network saturation 
    (c) TCP makes communication between server and client
    (d) In TGI ? IP model Internet Layer is closest to the user. 
  193. The default part for SMTP is :
    (a) 21
    (b) 23
    (c) 25
    (d) 80
  194. The IP address are based on :
    (a) 16-bit addresses 
    (b) 32-bit addresses 
    (c) 64-bit addresses 
    (d) 8-bit addresses 
  195. FDDI used which type of physical topology ?
    (a) Bus 
    (b) Ring 
    (c) Star
    (d) Tree
  196. IF all devices connected to a central hub, then topology is called :
    (a) Free Topology 
    (b) Ring Topology 
    (c) Star Topology 
    (d) Tree Topology
  197.  
Tags

Below Post Ad

Contact Form

Name

Email *

Message *

WhatsApp Channel