IBPS SO IT paper 2012 (As found on the internet)
1. A
special type gateway that can keep external users from accessing resources on
the LAN users access the external
info is called:
- Repeater
- Firewall*
- Encryption
- Hub
- None of these
- What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end?
- Handshaking*
- Modem options
- Protocol
- All of these
- None of these
- In SQL, which command is used to changes data in a data table?
- UPDATE*
- INSERT
- BROWSE
- APPEND
- None of these
- In SQL, which of the following is not a data definition language command?
- RENAME
- REVOKE
- GRANT
- UPDATE*
- None of these
- Which command(s) is (are) used to redefine a column of the table in SQL ?
- ALTER TABLE*
- DEFINE TABLE
- MODIFY TABLE
- ALL of the these
- None of these
- In a relational schema, each tuple is divided into fields called
- Relations
- Domains
- Queries
- All of the these
- None of these*
- An indexing operation
- Sorts a file using a single key
- Sorts file using two keys
- Establishes an index for a file
- Both (1) and (3)*
- None of these
- Data security threats include
- Hardware failure
- Privacy invasion
- Fraudulent manipulation of data
- All of these*
- None of these
- The language used in application programs to request data from the DBMS is referred to as the
- DML
- DDL
- Query language*
- DCL
- None of these
- A ___ contains the smallest unit of meaningful data, so you might call it the basic building block for a data file.
- File structures
- Records
- Fields*
- Database
- None of these
- A ___ means that one record in a particular record type is related to only one record of another record type.
- One to one relationship*
- One to many relationship
- Many toone relationship
- Many to many relationship
- None of these
- Through linked list one can implement
- Stack
- Graph
- Queue
- All of these*
- None of these
- A heap allows a very efficient implementation of a
- Doubled ended queue
- Priority queue
- Stack
- Trees
- None of these
- In files, there is a key associated with each record which is used to differentiate among different records. For every file there is at least one set of keys that is unique. Such a Key is called
- Unique key
- Prime attribute
- Index key
- Primary Key*
- Null key
- ____ is primarily used for mapping host names and email destinations to IP address but can also be used for other purposes.
- TCP(transfer control protocol)
- DNS(Domain Name System)*
- SHA (Secure Hash Algorithm)
- Simple Network Management Protocol (SNMP)
- None of these
- Override is a method
- For an operation that replaces an inherited method for the same operation*
- For a data that replaces an inherited method for the same operation
- For an operation that takes arguments form library function
- All of these
- None of these
- Local variables
- Are created outside a block
- Are known only to that block*
- Continue to exist when their block ends
- Are illegal in C++
- None of these
- ____ is virus that inserts itself into a system’s memory. Then it take number of actions when an infected file is executed.
- Web scripting virus
- Polymorphic virus
- Macro virus
- Boot sector virus
- Resident virus*
- This ___ data mining technique derives rules from real world case examples.
- Waterfall model
- RAD
- White Box
- Spiral model
- Case based reasoning*
- The ___ remains operative until the software is required.
1.
Waterfall model*
2.
Incremental model
3.
Spiral model
4.
Prototyping model
5.
Incremental model
- Data mining evolve as a mechanism to cater the limitations of ___ systems to deal massive data sets with high dimensionality, new data type, multiple heterogeneous data resource etc.
.
OLTP
A.
OLAP*
B.
DSS
C.
DWH
D.
None of these
- An important application of cryptography, used in computerized commercial and financial transaction
.
Data mining
A.
Data warehousing
B.
Digital signature*
C.
Media convergence
D.
None of these
- Rows of a relation are called:
.
Relation
A.
Tuples*
B.
Data structure
C.
An entity
D.
None of these
- The drawbacks of the binary tree sort are remedied by the
.
Linear sort
A.
Quick Sort
B.
Heap Sort
C.
Insertion Sort
D.
None of these
- Which layer of OSI determines the interface of the system with the user?
.
Network
A.
Application*
B.
Data link
C.
Session
D.
None of these
1.
The tracks on a disk which can be accused without repositioning the R/W heads
is
a. Surface
b. Cylinder
c. Cluster
d. All of these
e. None of these
Ans : b
2. Which of the following is true about GUIs ?
a. They make computers easier to use for non professionals
b. They use icons and menus that users can select with
a mouse
c. Both a and b
d. All of these
e. None of these
Ans : c
3. A computer system consisting of its processor,
memory and I/O devices accepts data, processes it and produces the output
results. Can you tell in which component is the raw data fed ?
a. Mass Memory
b. Main Memory
c. Logic Unit
d. Arithmetic Unit
e. None of these
Ans : b
4. The mechanical diskette drive in which you insert
your diskette is connected to the computer's ________ bus
a. Data
b. Communication
c. Address
d. Parallel
e. None of these
Ans : b
5. A set of programs that handle firm's database
responsibilities is called a
a. Data Base Management System (DBMS)
b. Data Base Processing System (DBPS)
c. Data Management System (DMS)
d. All of these
e. None of these
Ans : d
6. You are in the process of analyzing a problem that
requires you to collect and store TCP/IP Packets. Which of the following
utilities is best suited for this purpose ?
a. NBTSTAT
b. Performance Monitor
c. NETSTAT
d. Network Monitor
e. DHCP Management Console
Ans : d
7. A top to bottom relationship among the items in a
database is established by a
a. Hierarchical Schema
b. Network Schema
c. Relational Schema
d. All of these
e. None of these
Ans : a
8. The process of transferring data intended for a
peripheral device into a disk (or intermediate store) so that it can be
transferred to peripheral at a more convenient time or in bulk is known as
a. Multi Programming
b. Spooling
c. Caching
d. Virtual Programming
e. None of these
Ans : b
9. Which of the following system program forgoes the
production of object code to generate absolute machine code and load it into
the physical main storage location from which it will be executed immediately upon
completion of the assembly ?
a. Two pass assembler
b. Load and go assembler
c. Macro processor
d. Compiler
e. None of these
Ans : b
10. Relocation bits used by relocating loader are
specified (generated) by
a. Relocating loader itself
b. Linker
c. Assembler or translator
d. Macro Processor
e. None of these
Ans : b
11. From what location are the 1st computer
instructions available on boot up ?
a. ROM BIOS
b. CPU
c. Boot.ini
d. CONFIG.SYS
e. None of these
Ans : a
12. Abstraction is __________
a. The act of representing the essential features of
something without including much detail
b. The act of representing the features of something
much detail
c. A tree structure
d. All of these
e. None of these
Ans : a
13. Aggregation is a special form of _____
a. Generalization
b. Spectalization
c. Association
d. Object
e. None of these
Ans : c
14. Consider an operation of addition. For two numbers,
the operating will generate a sum. If the operand are strings and the same
operation would produce a third string by concatenation. This feature is called
a. Inheritance
b. Encapsulation
c. Polymorphism
d. Binding
e. None of these
Ans : c
15. In E - R diagrams, the term cardinality is a
synonym for the term ___
a. Attribute
b. Degree
c. Entities
d. Cartesian
e. None of these
Ans : b
16. An oracle server index ____
a. Is a schema object
b. Is used to speed up the retrieval of rows by using a
pointer
c. Is independent of the table it indexes
d. All of these
e. None of these
Ans : d
17. Which of the following is not a context free
grammar components ?
a. Terminal symbols
b. Non termincal symbol
c. Production line
d. List
e. None of these
Ans : d
18. Which of the following is a phase of RAD model ?
a. Business modeling
b. Data modeling
c. Application generation
d. All of these
e. None of these
Ans : d
19. ______ is a set design steps that allows a DFD with
transform flow characteristics to be mapped into a predefined template for
program structure.
a. Transaction flow
b. Contributor
c. Transform mapping
d. Design evaluation
e. None of these
Ans : c
20. A combinational logic circuit which is used to send
data coming from a single source to two or more separate destinations is called
as
a. Decoder
b. Encoder
c. Multiplexer
d. Demultiplexer
e. None of these
Ans : d
21. Which of the following is a Universal Gate ?
a. AND
b. OR
c. EX - OR
d. NAND
e. None of these
Ans : d
22. The 2's compliment of binary number 010111.1100 is
a. 101001.1100
b. 101000.0100
c. 010111.0011
d. 101000.0011
e. None of these
Ans : b
23. In 8086, the overflow flag is set when
a. The sum is more than 16 bits
b. Signed numbers go out their range after an
arithmetic operation
c. Carry and sign flags are set
d. During subtraction
e. None of these
Ans : b
24. What does mircro processor speed depends on ?
a. Clock
b. Data bus width
c. Address bus width
d. All of these
e. None of these
Ans : c
TO BUY ONLINE STUDY MATERIAL CALL DAS SIR AT 08961556195/09038870684 OR EMAIL AT tamal253@yahoo.comCHECK SAMPLES OF MATERIAL BEFORE YOU ORDER & BE ASSURED.
25. The TRAP is one of the interrupts available its
INTEL 8086. Which one statement is true of TRAP ?
a. It is level triggered
b. It is negative edge triggered
c. It is positive edge triggered
d. It is both positive edge triggered and level
triggered
e. None of these
Ans : d
26. A special type gateway that can keep external users
from accessing resources on the LAN users access the external info is called
_____
a. Repeater
b. Firewall
c. Encryption
d. Hub
e. None of these
Ans : b
27. What is the name given to the exchange of control
signals which is necessary for establishing a connection between a modem and a
computer at one end of a line and another modem and computer at the other end ?
a. Handshaking
b. Modem Options
c. Protocol
d. All of these
e. None of these
Ans : a
28. In SQL, which command is used to change data in a
data table ?
a. UPDATE
b. INSERT
c. BROWSE
d. APPEND
e. None of these
Ans : a
29. In SQL, which of the following is not a data
definition language command ?
a. RENAME
b. REVOKE
c. GRANT
d. UPDATE
e. None of these
Ans : d
30. Which command(s) is(are) used to redefine a column
of the table in SQL ?
a. ALTER TABLE
b. DEFINE TABLE
c. MODIFY TABLE
d. All of these
e. None of these
Ans : a
31. In a relational schema, each tuple is divided into
fields called
a. Relations
b. Domains
c. Queries
d. All of the these
e. None of these
Ans : b
32. An indexing operation
a. Sorts a file using a single key
b. Sorts file using two keys
c. Establishes an index for a file
d. Both a and c
e. None of these
Ans : c
33. Data security threats include
a. Hardware failure
b. Privacy invasion
c. Fraudulent manipulation of data
d. All of these
e. None of these
Ans : b
34. The language used in application programs to
request data from the DBMS is referred to as the
a. DML
b. DDL
c. Query Language
d. DCL
e. None of these
Ans : a
35. A________ contains the smallest unit of meaningful
data, so you might call it the basic building block for a data file.
a. File Structures
b. Records
c. Fields
d. Data base
e. None of these
Ans : c
36. A ______ means that one record in a particular
record type is related to only one record of another record type.
a. One-to-one relationship
b. One-to-many relationship
c. Many-to-one relationship
d. Many-to-many relationship
e. None of these
Ans : a
37. Through linked list one can implement ____
a. Stack
b. Graph
c. Queue
d. All of these
e. None of these
Ans : d
38. A heap allows a very efficient implementation of a
____
a. Double ended queue
b. Priority queue
c. Stack
d. Trees
e. None of these
Ans : b
39. In files, there is a key associated with each
record which is used to differentiate among different records. For every file
there is atleast one set of keys that is unique. Such a Key is called ____
a. Unique Key
b. Prime attribute
c. Index key
d. Primary Key
e. Null key
Ans : d
40. _____ is primarily used for mapping host names and email
destinations to IP address but can also be used for other purposes
a. TCP (Transfer Control Protocol)
b. DNS (Domain Name System)
c. SHA (Secure Hash Algorithm)
d. Simple Network Management Protocol (SNMP)
e. None of these
Ans : b
41. Override is a method ____
a. For an operation that replaces an inherited method
for the same operation
b. For a data that replaces an inherited method for the
same operation
c. For an operation that takes arguments from library
function
d. All of these
e. None of these
Ans : a
42. Local Variables ______
a. Are created outside a block
b. Are known only to that block
c. Continue to exist when their block ends
d. Are illegal in C++
e. None of these
Ans : b
43. ______ is virus that inserts itself into a system's
memory. Then it take number of actions when an infected file is executed.
a. Web scripting virus
b. Polymorphic Virus
c. Macro virus
d. Boot sector virus
e. Resident virus
Ans : e
44. This _____ data mining technique derives rules from
real world case examples.
a. Waterfall model
b. RAD
c. White Box
d. Spiral model
e. Case based reasoning
Ans : e
45. The ____ model remains operative until the software
is required.
a. Waterfall model
b. Incremental model
c. Spiral model
d. Prototyping model
e. Incremental model
Ans : c
46. Data mining evolve as a mechanism to cater the
limitations of ____ systems to deal massive data sets with high dimensionality,
new data type, multiple heterogeneous data resource etc..
a. OLTP
b. OLAP
c. DSS
d. DWH
e. None of these
Ans : a
47. An important application of cryptography, used in
computerized commercial and financial transaction ____
a. Data mining
b. Data warehousing
c. Digital signature
d. Media convergence
e. None of these
Ans : c
48. Rows of a relation are called __
a. Relation
b. Tuples
c. Data structure
d. An entity
e. None of these
Ans : b
49. The drawbacks of the binary tree sort are remedied
by the
a. Linear sort
b. Quick sort
c. Heap Sort
d. Insertion sort
e. None of these
Ans : c
50. Which layer of OSI determines the interface of the
system with the user ?
a. Network
b. Application
c. Data link
d. Session
e. None of these
Ans : b
NETWORKING
1. When collection of various computers seems a single coherent system to
its client, then it is called
a) computer network
b) distributed system
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
2. Two devices are in network if
a) a process in one device is able to exchange information with a process in
another device
b) a process is running on both devices
c) PIDs of the processes running of different devices are same
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
3. Which one of the following computer network is built on the top of
another network?
a) prior network
b) chief network
c) prime network
d) overlay network
View Answer
Answer:d
Explanation:None.
4. In computer network nodes are
a) the computer that originates the data
b) the computer that routes the data
c) the computer that terminates the data
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
advertisements
5. Communication channel is shared by all the machines on
the network in
a) broadcast network
b) unicast network
c) multicast network
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
6. Bluetooth is an example of
a) personal area network
b) local area network
c) virtual private network
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
7. A _____ is a device that forwards packets between networks by processing
the routing information included in the packet.
a) bridge
b) firewall
c) router
d) all of the mentioned
View Answer
Answer:c
Explanation:None.
8. A list of protocols used by a system, one protocol per layer, is called
a) protocol architecture
b) protocol stack
c) protocol suit
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
advertisements
9. Network congestion occurs
a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes terminates
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
10. Which one of the following extends a private network across public
networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network
View Answer
Answer:b
1) The IETF standards documents are called
(Internet Engineering task force )
a) RFC Request For Comments
b) RCF
c) ID
d) None of the mentioned
View Answer
Answer: a
Explanation: Request For Comments.
2) In the layer hierarchy as the data packet moves from the upper to the
lower layers, headers are
a) Added
b) Removed
c) Rearranged
d) Modified
View Answer
Answer: a
Explanation: Every layer adds its own header to the packet from previous layer.
Uppermost layer – Application layer . Lowermost layer –Physical
3) The structure or format of data is called
a) Syntax
b) Semantics
c) Struct
d) None of the mentioned
View Answer
Answer: a
Explanation: Semantics defines how a particular pattern to be interpreted, and
what action is to be taken based on that interpretation.
4) Communication between a computer and a keyboard involves ______________
transmission
a) Automatic
b) Half-duplex
c) Full-duplex
d) Simplex
View Answer
Answer: d
Explanation: Data flows in single direction.
advertisements
5) The first Network
a) CNNET
b) NSFNET
c) ASAPNET
d) ARPANET
View Answer
Answer: d
Explanation: None.
6) The _______ is the physical path over which a message travels
a) Ppath
b) Medium
c) Protocol
d) Route
View Answer
Answer: b
Explanation: Message travel from sender to reciever via a medium using a
protocol.
8) Which of this is not a network edge device?
a) PC
b) Smartphones
c) Servers
d) Switch
View Answer
Answer: d
Explanation: Network egde devices refer to host systems, which can host
applications like web browser.
advertisements
9) A set of rules that governs data communication
a) Protocols
b) Standards
c) RFCs
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
10) Three or more devices share a link in ________ connection
a) Unipoint
b) Multipoint
c) Point to point
d) None of the mentioned
View Answer
Answer: b
1. OSI stands for
a) open system interconnection
b) operating system interface
c) optical service implementation
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
2. The OSI model has ___ layers.
a) 4
b) 5
c) 6
d) 7
View Answer
Answer:d
Explanation:None.
3. TCP/IP model does not have ______ layer but OSI model have this layer.
a) session layer
b) presentation layer
c) application layer
d) both (a) and (b)
View Answer
Answer:d
Explanation:None.
4. Which layer links the network support layers and user support layers
a) session layer
b) data link layer
c) transport layer
d) network layer
View Answer
Answer:c
Explanation:Physical, data link and network layers are network support layers
and session, presentation and application layers are user support layers.
advertisements
5. Which address is used in an internet employing the
TCP/IP protocols?
a) physical address and logical address
b) port address
c) specific address
d) all of the mentioned
View Answer
Answer:d
Explanation: Four levels of addresses are used in an internet employing the
TCP/IP protocols: physical (link) addresses, logical (IP) addresses, port
addresses, and specific addresses.
Addresses in TCP/IP network model
Each address is related to a specific layer in the TCP/IP network model
architecture, as shown in Figure 2.18.
Port address
Today, computers are devices that can run multiple processes
at the same time. The end objective of Internet communication is a process
communicating with another process. For example, computer A can communicate
with computer C by using TELNET. At the same time, computer A communicates with
computer B by using the File Transfer Protocol (FTP). For these processes to
receive data simultaneously, we need a method to label the different processes.
In other words, they need addresses. In the TCP/IP network model architecture,
the label assigned to a process is called a port address. A port address in
TCP/IP network model is 16 bits in length.
Specific Addresses in a network model :
Some applications have user-friendly addresses that are
designed for that specific address. Examples include the e-mail address (for
example, network-model@network.edu) and the Universal Resource Locator (URL)
(for example, www.network-model.com). The first defines the recipient of an
e-mail, the second is used to find a document on the World Wide Web.
Addresses, however, get changed to the corresponding port and logical addresses
by the sending computer in a network model.
6. TCP/IP model was developed _____ the OSI model.
a) prior to
b) after
c) simultaneous to
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
7. Which layer is responsible for process to process delivery?
a) network layer
b) transport layer
c) session layer
d) data link layer
View Answer
Answer:b
Explanation:None.
8. Which address identifies a process on a host?
a) physical address
b) logical address
c) port address
d) specific address
View Answer
Answer:c
Explanation:None.
advertisements
9. Which layer provides the services to user?
a) application layer
b) session layer
c) presentation layer
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
10. Transmission data rate is decided by
a) network layer
b) physical layer
c) data link layer
d) transport layer
View Answer
Answer:b
1. The physical layer concerns with
a) bit-by-bit delivery
p) process to process delivery
c) application to application delivery
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
2. Which transmission media has the highest transmission speed in a network?
a) coaxial cable
b) twisted pair cable
c) optical fiber
d) electrical cable
View Answer
Answer:c
Explanation:None.
3. Bits can be send over guided and unguided media as analog signal by
a) digital modulation
b) amplitude modulation
c) frequency modulation
d) phase modulation
View Answer
Answer:a
Explanation: Bits are digital so digital modulation.
4. The portion of physical layer that interfaces with the media access
control sublayer is called
a) physical signalling sublayer
b) physical data sublayer
c) physical address sublayer
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
advertisements
5. physical layer provides
a) mechanical specifications of electrical connectors and cables
b) electrical specification of transmission line signal level
c) specification for IR over optical fiber
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
6. In asynchronous serial communication the physical layer provides
a) start and stop signalling
b) flow control
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
7. The physical layer is responsible for
a) line coding
b) channel coding
c) modulation
d) all of the mentioned
View Answer
Answer:d
Explanation: In telecommunications, node-to-node data transfer
is the movement of data from one node of a network to the next. In the OSI model
it is handled by the lowest two layers, the data
link layer and the physical layer.
In most communication systems, the transmitting point applies source
coding, followed by channel coding, and lastly, line
coding. This produces the baseband signal. Some systems then use modulation
to multiplex many baseband signals into a broadband signal.
(The receiver un-does these transformations in reverse order: demodulation,
trellis decoding, error detection and correction, decompression).
8. The physical layer translates logical communication requests from the
______ into hardware specific operations.
a) data link layer
b) network layer
c) trasnport layer
d) application layer
View Answer
Answer:a
Explanation:None.
advertisements
9. A single channel is shared by multiple signals by
a) analog modulation
b) digital modulation
c) multiplexing
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
10. Wireless transmission can be done via
a) radio waves
b) microwaves
c) infrared
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
1. The data link layer takes the packets from _____ and encapsulates them
into frames for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
View Answer
Answer:a
Explanation:None.
2. Which one of the following task is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding
View Answer
Answer:d
Explanation:None.
3. Which sublayer of the data link layer performs data link functions that
depend upon the type of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
4. Header of a frame generally contains
a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
5. Automatic repeat request error management mechanism is
provided by
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned
View Answer
Answer:a
Explanation: The data link layer functionality is usually split it into logical
sub-layers, the upper sub-layer, termed as LLC, that interacts with the network
layer above and the lower sub-layer, termed as MAC, that interacts with the
physical layer below.
While LLC is responsible for handling multiple Layer3
protocols (multiplexing/de-multiplexing) and link services like reliability and
flow control, the MAC is responsible for framing and media access control for
broadcast media. The functional overview of LLC and MAC sub-layers are given in
the diagram below .
6. When 2 or more bits in a data unit has been changed during the
transmission, the error is called
a) random error
b) burst error
c) inverted error
d) none of the mentioned
View Answer
Answer:b
Explanation: such errors can not be identified for correction.
7. CRC stands for
a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check
View Answer
Answer:a
Explanation:None.
8. Which one of the following is a data link protocol?
a) ethernet
b) point to point protocol
c) HDLC
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
9. Which one of the following is the multiple access
protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
10. The technique of temporarily delaying outgoing outgoing
acknowledgements so that they can be hooked onto the next outgoing data frame
is called
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
1. The network layer concerns with
a) bits
b) frames
c) packets
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
2. Which one of the following is not a function of network layer?
a) routing
b) inter-networking
c) congestion control
d) none of the mentioned
View Answer
Answer:d
Explanation:None.
3. The 4 byte IP address consists of
a) network address
b) host address
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation: Four byte means 32 bits
4. In virtual circuit network each packet contains
a) full source and destination address
b) a short VC number
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:b
Explanation: Virtual circuit
5. Which one of the following routing algorithm can be used
for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
7. A subset of a network that includes all the routers but contains no
loops is called
a) spanning tree
b) spider structure
c) spider tree
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
8. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) none of the mentioned
View Answer - ALL ARE USED
Answer:d
Explanation:None.
9. The network layer protocol of internet is
a) ethernet
b) internet protocol
c) hypertext transfer protocol
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
10. ICMP is primarily used for
a) error and diagnostic functions
(ping)
b) addressing
c) forwarding
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
1. Transport layer aggregates data from different applications into a single
stream before passing it to
a) network layer
b) data link layer
c) application layer
d) physical layer
View Answer
Answer:a
Explanation:None.
2. Which one of the following is a transport layer protocol used in
internet?
a) TCP
b) UDP
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
3. User datagram protocol is called connectionless because
a) all UDP packets are treated independently by transport layer
b) it sends data as a stream of related packets
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
4. Transmission control protocol is
a) connection oriented protocol
b) uses a three way handshake to establish a connection
c) recievs data from application as a single stream
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
5. An endpoint of an inter-process communication flow across
a computer network is called
a) socket
b) pipe
c) port
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
6. Socket-style API for windows is called
a) wsock
b) winsock
c) wins
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
7. Which one of the following is a version of UDP with congestion
control?
a) datagram congestion control protocol
b) stream control transmission protocol
c) structured stream transport
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
8. A _____ is a TCP name for a transport service access point.
a) port
b) pipe
c) node
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
9. Transport layer protocols deals with
a) application to application communication
b) process to process communication
c) node to node communication
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
1. The ____ translates internet domain and host names to IP address.
a) domain name system
b) routing information protocol
c) network time protocol
d) internet relay chat
View Answer
Answer:a
Explanation:None.
2. Which one of the following allows a user at one site to establish a
connection to another site and then pass keystrokes from local host to remote
host?
a) HTTP
b) FTP
c) telnet
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
3. Application layer protocol defines
a) types of messages exchanged
b) message format, syntax and semantics
c) rules for when and how processes send and respond to messages
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
4. Which one of the following protocol delivers/stores mail to reciever
server?
a) simple mail transfer protocol
b) post office protocol
c) internet mail access protocol
d) hypertext transfer protocol
View Answer
Answer:a
Explanation:None.
6. Which one of the following is an internet standard protocol for managing
devices on IP network?
a) dynamic host configuration protocol
b) simple newtwork management protocol
c) internet message access protocol
d) media gateway protocol
View Answer
Answer:b
Explanation:None.
7. Which one of the following is not an application layer protocol?
a) media gateway protocol
b) dynamic host configuration protocol
c) resource reservation protocol
d) session initiation protocol
View Answer
Answer:c
Explanation:None.
8. Which protocol is a signalling communication protocol used for
controlling multimedia communication sessions?
a) session initiation protocol
b) session modelling protocol
c) session maintenance protocol
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
9. Which one of the following is not correct?
a) application layer protocols are used by both source and destination devices
during a communication session
b) application layer protocols implemented on the source and destination host
must match
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
10. When displaying a web page, the application layer uses the
a) HTTP protocol
b) FTP protocol
c) SMTP protocol
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
1) This is not a application layer protocol
a) HTTP
b) SMTP
c) FTP
d) TCP
View Answer
Answer: d
Explanation: TCP is transport layer protocol
2) The packet of information at the application layer is called
a) Packet
b) Message
c) Segment
d) Frame
View Answer
Answer: b
Explanation: None.
3) This is one of the architecture paradigm
a) Peer to peer
b) Client-server
c) HTTP
d) Both a and b
View Answer
Answer: d
Explanation: HTTP is a protocol.
4) Application developer has permission to decide the following on
transport layer side
a) Transport layer protocol (which
protocol to be used)
b) Maximum buffer size
c) Both of the mentioned
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
5) Application layer offers _______ service
a) End to end All
layers from TCP upwards are end to end.
b) Process to process
c) Both of the mentioned
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
6) E-mail is
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
View Answer
Answer: c
Explanation: Because it can work with available throughput.
7) Pick the odd one out
a) File transfer
b) File download
c) E-mail
d) Interactive games
View Answer
Answer: d
Explanation: Internet telephony is Loss-tolerant other applications are not.
8) Which of the following is an application layer service ?
a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
9) To deliver a message to the correct application program running on a
host, the _______ address must be consulted
a) IP
b) MAC
c) Port
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
10) This is a time-sensitive service
a) File transfer
b) File download
c) E-mail
d) Internet telephony
View Answer
Answer: d
Explanation: Internet telephony is Loss-tolerant other applications are not.
12) Electronic mail uses this Application layer protocol
a) SMTP
b) HTTP
c) FTP
d) SIP
View Answer
Answer: a
Explanation: None.
Explanation:None.
Explanation:None.
Explanation:None.
Explanation:None.
a) broadcast network
b) unicast network
c) multicast network
d) none of the mentioned
View Answer
Explanation:None.
Explanation:None.
Explanation:None.
Explanation:None.
a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes terminates
d) none of the mentioned
View Answer
Explanation:None.
Explanation: Request For Comments.
Explanation: Every layer adds its own header to the packet from previous layer. Uppermost layer – Application layer . Lowermost layer –Physical
Explanation: Semantics defines how a particular pattern to be interpreted, and what action is to be taken based on that interpretation.
Explanation: Data flows in single direction.
a) CNNET
b) NSFNET
c) ASAPNET
d) ARPANET
View Answer
Explanation: None.
Explanation: Message travel from sender to reciever via a medium using a protocol.
Explanation: Network egde devices refer to host systems, which can host applications like web browser.
a) Protocols
b) Standards
c) RFCs
d) None of the mentioned
View Answer
Explanation: None.
Explanation:None.
Explanation:None.
Explanation:None.
Explanation:Physical, data link and network layers are network support layers and session, presentation and application layers are user support layers.
a) physical address and logical address
b) port address
c) specific address
d) all of the mentioned
View Answer
Explanation: Four levels of addresses are used in an internet employing the TCP/IP protocols: physical (link) addresses, logical (IP) addresses, port addresses, and specific addresses.
Each address is related to a specific layer in the TCP/IP network model architecture, as shown in Figure 2.18.
Addresses, however, get changed to the corresponding port and logical addresses by the sending computer in a network model.
Explanation:None.
Explanation:None.
Explanation:None.
a) application layer
b) session layer
c) presentation layer
d) none of the mentioned
View Answer
Explanation:None.
Explanation:None.
Explanation:None.
Explanation: Bits are digital so digital modulation.
Explanation:None.
a) mechanical specifications of electrical connectors and cables
b) electrical specification of transmission line signal level
c) specification for IR over optical fiber
d) all of the mentioned
View Answer
Explanation:None.
Explanation:None.
Explanation:None.
a) analog modulation
b) digital modulation
c) multiplexing
d) none of the mentioned
View Answer
Explanation:None.
Explanation:None.
Explanation:None.
Explanation:None.
Explanation:None.
Explanation:None.
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned
View Answer
Explanation: The data link layer functionality is usually split it into logical sub-layers, the upper sub-layer, termed as LLC, that interacts with the network layer above and the lower sub-layer, termed as MAC, that interacts with the physical layer below.
Explanation: such errors can not be identified for correction.
Explanation:None.
Explanation:None.
a) CSMA/CD
b) CSMA/CA
c) both (a) and (b)
d) none of the mentioned
View Answer
Explanation:None.
Explanation:None.
Explanation:None.
Explanation:None.
Explanation: Four byte means 32 bits
Explanation: Virtual circuit
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
View Answer
Explanation:None.
Explanation:None.
Explanation:None.
a) ethernet
b) internet protocol
c) hypertext transfer protocol
d) none of the mentioned
View Answer
Explanation:None.
Explanation:None.
Explanation:None.
Explanation:None.
Explanation:None.
Explanation:None.
a) socket
b) pipe
c) port
d) none of the mentioned
View Answer
Explanation:None.
Explanation:None.
Explanation:None.
Explanation:None.
a) application to application communication
b) process to process communication
c) node to node communication
d) none of the mentioned
View Answer
Explanation:None.
Explanation:None.
Explanation:None.
Explanation:None.
Explanation:None.
Explanation:None.
Explanation:None.
Explanation:None.
a) application layer protocols are used by both source and destination devices during a communication session
b) application layer protocols implemented on the source and destination host must match
c) both (a) and (b)
d) none of the mentioned
View Answer
Explanation:None.
Explanation:None.
Explanation: TCP is transport layer protocol
Explanation: None.
Explanation: HTTP is a protocol.
Explanation: None.
Explanation: None.
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
View Answer
Explanation: Because it can work with available throughput.
Explanation: Internet telephony is Loss-tolerant other applications are not.
Explanation: None.
Explanation: None.
Explanation: Internet telephony is Loss-tolerant other applications are not.
Explanation: None.
Hi, your article was of great help. I loved the way you shared the information, thanks.
ReplyDeleteAmazing article, I highly appreciate your efforts, it was highly helpful. Thank you.
CISSP training
cissp exam cost
CISSP certification.
Hi, your article was of great help. I loved the way you shared the information, thanks.
ReplyDeleteAmazing article, I highly appreciate your efforts, it was highly helpful. Thank you.
ec council.
ceh v10.
ethical hacking training.