1) Which of these is a standard interface for serial data transmission?
(a) ASCII
(b) RS232C
(c) 2
(d) Centronics
Answer
Answer: (b) RS232C
Explanation: The RS232C is a standard interface for serial data transmission that defines the protocol and physical interface for transmitting serial data fairly easily between associated appliances and computers.
2) Which type of topology is best suited for large businesses which must carefully control and coordinate the operation of distributed branch outlets?
(a) Ring
(b) Local area
(c) Hierarchical
(d) Star
Answer
Answer: (d) Star
Explanation: The star topology is the best network topology for large businesses because it is simple to control and coordinate from the central computer.
3) Which of the following transmission directions listed is not a legitimate channel?
(a) Simplex
(b) Half Duplex
(c) Full Duplex
(d) Double Duplex
Answer
Answer: (d) Double Duplex
Explanation: Double duplex is not a legitimate channel for transmission in computer network.
4) “Parity bits” are used for which of the following purposes?
(a) Encryption of data
(b) To transmit faster
(c) To detect errors
(d) To identify the user
Answer
Answer: (c) To detect errors
Explanation: The parity bit is also known as the check bit, and has a value of 0 or 1. It is used for error detection for blocks of data.
5) What kind of transmission medium is most appropriate to carry data in a computer network that is exposed to electrical interferences?
(a) Unshielded twisted pair
(b) Optical fiber
(c) Coaxial cable
(d) Microwave
Answer
Answer: (b) Optical fiber
Explanation: The optical fiber is made of glass or plastic. In this cable, the transmission of data occurs in the form of light rather than the electric current, so this cable provides higher data transfer speed than other cables.
6) A collection of hyperlinked documents on the internet forms the ?.?
(a) World Wide Web (WWW)
(b) E-mail system
(c) Mailing list
(d) Hypertext markup language
Answer
Answer: (a) World Wide Web (WWW)
Explanation: World Wide Web (WWW) creates a collection of hyperlinked documents on the Internet.
7) The location of a resource on the internet is given by its?
(a) Protocol
(b) URL
(c) E-mail address
(d) ICQ
Answer
Answer: (b) URL
Explanation: A URL (Uniform Resource Locator) is a database connection that describes the database’s location on a computer network and the retrieval process. A URL is a different form of URI (Uniform Resource Identifier) although the two words are used interchangeably by many people.
8) The term HTTP stands for?
(a) Hyper terminal tracing program
(b) Hypertext tracing protocol
(c) Hypertext transfer protocol
(d) Hypertext transfer program
Answer
Answer: (c) Hypertext transfer protocol
Explanation: The term HTTP stands for Hypertext transfer protocol.
9) A proxy server is used as the computer?
(a) with external access
(b) acting as a backup
(c) performing file handling
(d) accessing user permissions
Answer
Answer: (a) with external access
Explanation: A proxy server is a computer that acts as a gateway between a user’s computer and the Internet. The proxy server is also called application level gateway. By this the client computer can establish indirect network connection to another network.
10) Which one of the following would breach the integrity of a system?
(a) Looking the room to prevent theft
(b) Full access rights for all users
(c) Fitting the system with an anti-theft device
(d) Protecting the device against willful or accidental damage
Answer
Answer: (b) Full access rights for all users
Explanation: None
11) Which software prevents the external access to a system?
(a) Firewall
(b) Gateway
(c) Router
(d) Virus checker
Answer
Answer: (a) Firewall
Explanation: A firewall is a network securing software that prevents unauthorized users and dangerous elements from accessing the network. Software firewall acts as a filter for our network which prevents harmful information.
12) Which one of the following is a valid email address?
(a) btechgeeks@geek.com
(b) gmail.com
(c) tpoint@.com
(d) btechgeeks@books
Answer
Answer: (a)btechgeeks@geeks.com
Explanation: A proper email address is a combination of the email prefix and email domain, both in appropriate formats. The domain appears to the right side of the @ symbol and the prefix appears to the left side of the @ symbol.
For example, in this email address btechgeeks@geeks.com, “btechgeeks” is the prefix, and “geeks.com” is the domain.
13) Which of the following best describes uploading information?
(a) Sorting data on a disk drive
(b) Sending information to a host computer
(c) Receiving information from a host computer
(d) Sorting data on a hard drive
Answer
Answer: (b) Sending information to a host computer
Explanation: None
14) Which one of the following is the most common internet protocol?
(a) HTML
(b) NetBEUI
(c) TCP/IP
(d) IPX/SPX
Answer
Answer: (c) TCP/IP
Explanation: TCP/IP is the most common internet protocol because it is the most widely used network protocol.
15) Software programs that allow you to legally copy files and give them away at no cost are called which of the following?
(a) Probe ware
(b) Timeshare
(c) Shareware
(d) Public domain
Answer
Answer: (d) Public domain
Explanation: Public domain software can be modified, distributed or sold by anyone without any attention, but no one can ever own it.
16) The term FTP stands for?
(a) File transfer program
(b) File transmission protocol
(c) File transfer protocol
(d) File transfer protection
Answer
Answer: (c) File transfer protocol
Explanation: The term FTP stands for File transfer protocol.
17) At what speed does tele-computed refer?
(a) Interface speed
(b) Cycles per second
(c) Baud rate
(d) Megabyte load
Answer
Answer: (c) Baud rate
Explanation: In telecommunication, baud rate is a specific unit of the speed rate. It is one of the significant functions that determine the speed of the communication over the data channel.
18) Which one of the following is not a network topology?
(a) Star
(b) Ring
(c) Bus
(d) Peer to Peer
Answer
Answer: (d) Peer to Peer
Explanation: Peer to Peer network is a network to which all computers are used the same resources and rights as other computers. Its network designed primarily for the small local area.
19) The maximum length (in bytes) of an IPv4 datagram is?
(a) 32
(b) 1024
(c) 65535
(d) 512
Answer
Answer: (c) 65535
Explanation: None
20) Which of the following statements could be valid with respect to the ICMP (Internet Control Message Protocol)?
(a) It reports all errors which occur during transmission.
(b) A redirect message is used when a router notices that a packet seems to have been routed wrongly.
(c) It informs routers when an incorrect path has been taken.
(d) The “destination unreachable” type message is used when a router cannot locate the destination.
Answer
Answer: (b) A redirect message is used when a router notices that a packet seems to have been routed wrongly.
Explanation: None
21) The IP network 192.168.50.0 is to be divided into 10 equal sized subnets. Which of the following subnet masks can be used for the above requirement?
(a) 255.243.240
(b) 255.255.0.0
(c) 255.255.0
(d) 255.255.255
Answer
Answer: (c) 255.255.255.0
Explanation: This address belongs to class C, so 8 bits are reserved for the host ID. 24 bits are reserved for network ID.
22) When the mail server sends mail to other mail servers it becomes ___ ?
(a) SMTP client
(b) SMTP server
(c) Peer
(d) Master
Answer
Answer: (a) SMTP client
Explanation: The SMTP client is an organization that allows sending emails using the SMTP server. SMTP servers can’t send emails to other SMTP servers separately. It is based on client-server architecture.
23) The length of an IPv6 address is?
(a) 32 bits
(b) 64 bits
(c) 128 bits
(d) 256 bits
Answer
Answer: (c) 128 bits
Explanation: An IPv6 address is 128 bits long, which has 2^128 address space.