LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Select The Blank Question An effective way to analyze the problem is a ________.
Correct Answer Flowchart
Your Answer Flowchart
True/False Question Data can be lost if a transmission error is encountered on a network.
Correct Answer True
Your Answer True
True/False Question VoIP is likely to take over the traditional phone system.
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer Question When a ring topology is configured on a network it usually ?
Correct Answer Involves high cost , Complex in nature , Difficult to trouble shoot
Your Answer Involves high cost , Complex in nature , Difficult to trouble shoot
Multiple Choice Single Answer Question The layout and connection of computers in a network is called:
Correct Answer Network Topology
Your Answer Network Topology
Multiple Choice Single Answer Question Nodes involved in routing process is limited to forwarding data packets based on
Correct Answer Internal information
Your Answer IP address
Select The Blank Question The single interface protocol creates a ________ environment.
Correct Answer User friendly
Your Answer Unpredictable
Multiple Choice Multiple Answer Question A gateway can be used to interconnect systems with different
Correct Answer Protocols , Languages , Architecture
Your Answer Protocols , Languages , Architecture
True/False Question In parity checking if external interference introduces an error all the bits will be
changed to zero. Correct Answer False
Your Answer False
Multiple Choice Multiple Answer Question The two type of authentication mechanism available for VPN's are :
Correct Answer Password authentication , Digital certificates
Your Answer Message authentication code , Password authentication
Multiple Choice Multiple Answer Question NAS comes with built-in features such as :
Correct Answer Disk space quotas , Error detection , Secure authentication
Your Answer Disk space quotas , Error detection , Secure authentication
Select The Blank Question Navigation is accomplished by ________ with the mouse on hyperlinks and graphics.
Correct Answer Pointing & Clicking
Your Answer Pointing & Clicking
True/False Question If users connected to the LAN wish to use internet they can use telnet to the gateway
Correct Answer True
Your Answer True
True/False Question The NIC has one or more external ports to which the network cable is attached.
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer Question Which players can be used to play streaming audio and video files ?
Correct Answer Windows Media Player , RealPlayer , QuickTime
Your Answer Windows Media Player , RealPlayer , QuickTime
Multiple Choice Multiple Answer
Question A storage area network (SAN) is based on :
Correct Answer Fiber channel , Switches , Hub
Your Answer Fiber channel , Switches , Hub
Multiple Choice Multiple Answer Question Communication devices available for instant compability with desktop computers
specifically for transfer data through : Correct Answer Bluetooth , Wi-FI , USB
Your Answer USB , Bluetooth , Wi-FI
True/False Question Network topology is not concerned with the architecture of the network
Correct Answer True
Your Answer True
True/False Question The Algorithm usually gets complex for programs which are large in size.
Correct Answer True
Your Answer True
Select The Blank Question The ________ integrated circuit pulls millions of transistors into one circuit chip.
Correct Answer Monolithic
Your Answer Monolithic
Multiple Choice Single Answer Question Internet access is usually provided by Internet Service providers, this connectivity or
setup is a network design which is classified under : Correct Answer MAN
Your Answer MAN
Multiple Choice Single Answer Question In an organization where the development of the application softwares is the major
activity, the strategy to develop the complete software adopted using a network is Correct Answer Group software development
Your Answer Download and Deploy
Select The Blank Question A SAN exploits new breeds of ________ technology to get the best out of network
devices. Correct Answer Clustering
Your Answer Clustering
Select The Blank Question Possession of ________ grants the right to transmit data to that terminal over a
network. Correct Answer Token
Your Answer Token
Multiple Choice Single Answer Question Which type of jacket is used in shielded twisted pair cable to gurad the wires from
electrical interference ? Correct Answer Copper
Your Answer Copper
Multiple Choice Single Answer Question What is used to measure the sharpness of the monitor display ?
Correct Answer Dot pitch
Your Answer Resolution
Multiple Choice Multiple Answer Question Every flowchart must have proper
Correct Answer Start , Process
Your Answer Start , Data , Process
Select The Blank Question A switch maintains a list of ________ address associated with its ports.
Correct Answer MAC
Your Answer MAC
True/False Question Any station on a token ring network can be the active terminal.
Correct Answer True
Your Answer False
True/False Question Only One flow line should come out from a process in a flowchart.
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer Question What are the common methods of attack on your network ?
Correct Answer Network packet sniffers , IP spoofing , Password attack
Your Answer Network packet sniffers , IP spoofing , Password attack
Match The FollowingQuestion Correct Answer Your Answer
Serial Communication Oneway transfer of data Oneway transfer of data
Protocols Data transmission software Data transmission software
Signals Electronic encoding of data Electronic encoding of data
Transmission Communication of data Communication of data
Multiple Choice Single Answer Question OS/2 is a multitasking operating system which was developed by
Correct Answer Microsoft and IBM
Your Answer HP and IBM
Select The Blank Question A computer is used to convert raw data into ________.
Correct Answer Information
Your Answer Information
Multiple Choice Single Answer Question Which protocol is used at the network layer of the OSI layers ?
Correct Answer Internet protocol
Your Answer Internet protocol
Multiple Choice Multiple Answer Question What additional features are present in JavaScript which were not present in HTML.
Correct Answer Moving tickers , Drop-down menus , Mouse-over interactions
Your Answer Mouse-over interactions
Match The FollowingQuestion Correct Answer Your Answer
A cooking recipe would be Algorithm Algorithm
Graphical Representation of the solution to a problem
Flowchart Flowchart
Set of Logical Statements Algorithm Problem Domain
Program Set of Instructions Set of Instructions
Multiple Choice Single Answer Question When the organizations share data on a network, the data is critical in nature and it
should be highly secure, this data security and management is the task of
Correct Answer Network Administrator
Your Answer Network Administrator
Multiple Choice Single Answer Question External web pages can be tracked using :
Correct Answer Proxy server
Your Answer Proxy server
Multiple Choice Multiple Answer Question Limitations of VoIP are
Correct Answer Latency , Jitter , Packet loss
Your Answer Latency , Jitter , Packet loss
Select The Blank Question Client generally access a NAS over a ________ connection.
Correct Answer Ethernet
Your Answer Ethernet
Multiple Choice Single Answer Question World wide web (WWW) has its own protocol known as
Correct Answer HTTP
Your Answer HTTP
Multiple Choice Single Answer Question A type of network where information is transmitted through telephone lines is
Correct Answer Wide Area Network
Your Answer Wide Area Network
Select The Blank Question A Network Interface Card is also called as ________.
Correct Answer Network Adapter
Your Answer Network Adapter
Multiple Choice Multiple Answer Question An NIC will be only functional when
Correct Answer Connected to a cable , Driver is Loaded and Configured
Your Answer Connected to a cable , Driver is Loaded and Configured , Operated by the Administrator
True/False
Question In walkie-talkie full-duplex data communication is used.
Correct Answer False
Your Answer False
Select The Blank Question A computer is an ________ device used to process data.
Correct Answer Electronic
Your Answer Electronic
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Multiple Choice Multiple Answer Question Systems which can be integrated with the home phone are
Correct Answer Digital video recorder , Digital subscription TV , Home security system
Your Answer Digital video recorder , Digital subscription TV , Home security system
Multiple Choice Single Answer Question The Photographs in digital cameras are stored in :
Correct Answer Memory
Your Answer Memory
Multiple Choice Single Answer Question Infrared can be used in transmission of data through :
Correct Answer Wireless
Your Answer Wireless
Select The Blank Question ________ software enables one computer to communicate with other
computer. Correct Answer Protocol
Your Answer Protocol
Multiple Choice Single Answer Question What should be done to increase the exposure and vulnerability of a
computer ? Correct Answer Connect to net
Your Answer Increase RAM
Multiple Choice Multiple Answer Question A computer program usually refers to a
Correct Answer Logical Sequence , Set of Instructions , Functional unit
Your Answer Set of Instructions
Select The Blank Question A Network topology is majorly concerned with the ________ arrangement
of computers in a network. Correct Answer Physical
Your Answer Physical
Multiple Choice Single Answer Question Which modems are prefered in VoIP computer to computer connection ?
Correct Answer DSL
Your Answer DSL
Multiple Choice Single Answer Question What can enable the server to provide application take over facility for its
peers computers ? Correct Answer 32 machine cluster
Your Answer Organisational Server
Multiple Choice Single Answer Question FTP is a program and method used to transfer
Correct Answer Files
Your Answer Files
Multiple Choice Multiple Answer Question Active server pages end with extentions
Correct Answer .asp , .aspx
Your Answer .asp , .aspx
Select The Blank Question A ________ serves as a good and effective documentation of the simple
and complex programs. Correct Answer Program Flowcharts
Your Answer Program Flowcharts
Multiple Choice Single Answer Question To have a successful communication of data mandatorily we require :
Correct Answer Sender & Reciever
Your Answer Sender & Reciever
Multiple Choice Single Answer Question In which technique the data is sliced into packets for transmission over a
network ?
Correct Answer Statistical time-division multiplexing
Your Answer Statistical time-division multiplexing
Multiple Choice Multiple Answer Question Protocol is a set of :
Correct Answer Procedures , Formal operating rules , Conventions
Your Answer Formal operating rules
Select The Blank Question Tabulating Machine can read and store data for ________ cards.
Correct Answer Punched
Your Answer Punched
True/False Question A URL specifies the internet address of a file stored on a personal
computer. Correct Answer False
Your Answer False
True/False Question NAS clients are connected to the individual storage devices.
Correct Answer False
Your Answer False
Select The Blank Question The HUB is a center of ________ topology.
Correct Answer Star
Your Answer Star
Multiple Choice Multiple Answer Question Pure input devices include:
Correct Answer Keyboard , Mouse , Scanner
Your Answer Keyboard , Mouse , Scanner
True/False Question CSMA/CA media access is slower than CSMA/CD.
Correct Answer True
Your Answer True
True/False
Question A Virtual private network is secure and has predictable performance.
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer Question SAN architecture makes it possible to relocate various activities such as :
Correct Answer Backup , Restore , File migration
Your Answer Backup , Restore , File migration
True/False Question Having a color printer as a globally shared printer on a network of say 10
computers is good practice to avail the benefits of networking. Correct Answer True
Your Answer True
True/False Question Analog signal is measured in volts and its frequency in hertz.
Correct Answer False
Your Answer True
True/False Question Transmission is collection of facts and figures.
Correct Answer False
Your Answer False
Multiple Choice Multiple Answer Question Flowchart is advantageous with respect to
Correct Answer Communication , Documentation , Efficient Coding
Your Answer Communication , Documentation , Efficient Coding
Multiple Choice Multiple Answer Question Which type of documents require greater and more convenient storage ?
Correct Answer JPEG , MPEG , MP3
Your Answer JPEG , MPEG , MP3
Multiple Choice Multiple Answer Question Data transmission is possible in the form of :
Correct Answer Serial Communication , Parallel Communication , Synchronous Transmission
Your Answer Serial Communication , Parallel Communication , Synchronous Transmission
Multiple Choice Single Answer Question People use hybrid processors usually when there is a need for :
Correct Answer Combined Processing
Your Answer Dual Processing
Select The Blank Question A ________ generates request in terms of commands to accomplish
certain task. Correct Answer Client
Your Answer Client
Select The Blank Question Computers on the internet use ________ architecture.
Correct Answer Client/server
Your Answer Client/server
Multiple Choice Multiple Answer Question Internet protocols has two basic responsibilities in delivery of data, what are
they ? Correct Answer Connectionless , Best-effort
Your Answer Connectionless , Best-effort
Select The Blank Question ________ is used in most technologies to solve the problem of missing
control character. Correct Answer Data stuffing
Your Answer Data stuffing
Select The Blank Question The WWW is a system of internet servers that support ________ to access
several internet protocols on a single interface. Correct Answer Hypertext
Your Answer Hypertext
Match The FollowingQuestion Correct Answer Your Answer
Chat server IRC IRC
E-mail SMTP SMTP
Usenet NNTP NNTP
File transfer protocol FTP FTP
Multiple Choice Single Answer
Question The sender releases the token when it recieves message specifically from a computer which is called as :
Correct Answer Reciever
Your Answer Reciever
True/False Question Monitors are found in flat screen.
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer Question A bar code printed on a product will depict information related to the
following things: Correct Answer Manufacturer , Product , Price
Your Answer Manufacturer , Product
Multiple Choice Single Answer Question Network attached storage create systems which are designed for :
Correct Answer Data storage
Your Answer Data storage
Multiple Choice Multiple Answer Question Select the modern equipments available in the market which use ROM
(Read Only Memory) to store data. Correct Answer Video Games , ATM's , Microwave
Your Answer Video Games , ATM's , Microwave
Multiple Choice Single Answer Question The flow of business process is effectively managed by a networking
concept namely, Correct Answer Data Sharing
Your Answer Internet Access
Match The FollowingQuestion Correct Answer Your Answer
Satellite Space orbit Space orbit
Radio Frequency range Frequency range
Infrared Light waves Light waves
Microwave Repeater station Repeater station
True/False Question In a Synchronous system partners have to sort permission before data
exchange begin.
Correct Answer True
Your Answer False
Select The Blank Question All the clients in a ________ topology are connected to a central unit called
a hub. Correct Answer Star
Your Answer Star
True/False Question In simplex data communication the data transfer is in one direction.
Correct Answer True
Your Answer True
Select The Blank Question The pressure of mutiple users of the network leads to implementation of
________. Correct Answer Packet based multiplexing
Your Answer Packet based multiplexing
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
True/False Question To access the world wide web you must
use a operating software. Correct Answer False
Your Answer False
Multiple Choice Single Answer Question The recipient decrypts the message
received by using his own: Correct Answer Private Key
Your Answer Private Key
Select The Blank Question Carrier sense means that each station
listens to ________ prior to transmitting. Correct Answer Cable
Your Answer Cable
Select The Blank Question A ________ attack occurs when an
outsider tries to be part of your network or legal terminal.
Correct Answer IP spoofing
Your Answer IP spoofing
True/False Question In parity checking if external interference
introduces an error all the bits will be changed to zero.
Correct Answer False
Your Answer False
Select The Blank Question CSMA/CA media access method is used
on ________ networks. Correct Answer Apple
Your Answer Apple
Select The Blank Question The key feature of a router is its capacity
to determine the ________ path to the destination.
Correct Answer Shortest
Your Answer Cost effective
Multiple Choice Single Answer Question A lost token error occurs when a token
Correct Answer Hangs up
Your Answer Hangs up
Multiple Choice Single Answer Question MICR magnetizes which type of particles
under the magnetic field ? Correct Answer Iron oxide
Your Answer Iron oxide
Multiple Choice Single Answer Question Business houses use the scanner to input
generally : Correct Answer Graphical Data
Your Answer Graphical Data
Multiple Choice Single Answer Question A network topology in which all the nodes
are connected to a single segment trunk is called a:
Correct Answer Bus
Your Answer Bus
True/False Question In simplex data communication the data
transfer is in one direction. Correct Answer True
Your Answer True
Multiple Choice Single Answer Question One should always ensure the flowcharts
have a logical Correct Answer Start & Finish
Your Answer Start & Finish
Multiple Choice Multiple Answer Question A Network architecture is concerned with:
Correct Answer Cabling Methods , Protocols
Your Answer Protocols , Hardware , Software
Multiple Choice Single Answer Question When a browser encounters a sound or
video file it hands off the data to other program called
Correct Answer Plug-ins
Your Answer Plug-ins
Multiple Choice Multiple Answer Question Data transmission is possible in the form
of : Correct Answer Serial Communication , Parallel
Communication , Synchronous Transmission
Your Answer Serial Communication , Parallel Communication , Synchronous Transmission
Select The Blank Question In video cameras ________ is used to
enhance resolution and color gamut. Correct Answer Image Sensors
Your Answer Image Sensors
Multiple Choice Multiple Answer Question What are the various types of wireless
media available in the market to transfer data ?
Correct Answer Radio , Infrared , Bluetooth
Your Answer Radio , Infrared , Bluetooth
True/False Question The NAS devices require no mouse,
keyboard or monitor. Correct Answer True
Your Answer True
Multiple Choice Multiple Answer Question Which programming languages are used
in extending the capabilities of the web ? Correct Answer XML , Java , DotNET
Your Answer Java , DotNET , XML
Multiple Choice Multiple Answer Question The two primary cryptographic systems in
use today are : Correct Answer Secret Key , Public Key
Your Answer Secret Key , Public Key
Multiple Choice Multiple Answer Question What are the nature of attacks on a
system's security over a network ? Correct Answer Unauthorized access , Misuse of
resources , Insert spurious packets Your Answer Unauthorized access , Misuse of
resources , Insert spurious packets
Multiple Choice Single Answer Question A technique in which a certain set of
predefined symbols are used to represent the flow of data is known as
Correct Answer Flowcharting
Your Answer Flowcharting
Select The Blank Question A ________ consists of a set of predefined
symbols. Correct Answer Flowchart
Your Answer Flowchart
Multiple Choice Multiple Answer Question Select the parts of a standard keyboard:
Correct Answer Function Keys , Modifier Keys , Cursor Keys
Your Answer Function Keys , Modifier Keys , Cursor Keys
Multiple Choice Multiple Answer Question List down different type of web browsers:
Correct Answer Text , Graphical
Your Answer Text , Graphical
True/False Question Email makes transmission of business
information secure and easier. Correct Answer True
Your Answer False
Multiple Choice Multiple Answer Question Flowchart is advantageous with respect to
Correct Answer Communication , Documentation , Efficient Coding
Your Answer Communication , Documentation , Efficient Coding
Select The Blank Question Generally CPU is called the ________ of
the computer. Correct Answer Brain
Your Answer Brain
Select The Blank Question A computer is used to convert raw data
into ________. Correct Answer Information
Your Answer Information
True/False Question Media access methods refer to how data
moves from one terminal to another over a network.
Correct Answer True
Your Answer True
True/False Question A blog consists of a signed and dated log
of individual postings. Correct Answer True
Your Answer True
Multiple Choice Multiple Answer Question A computer program usually refers to a
Correct Answer Logical Sequence , Set of Instructions , Functional unit
Your Answer Logical Sequence , Set of Instructions , Functional unit
Multiple Choice Single Answer Question Secure remote access over the internet for
mobile users and secure LAN connectivity can be achieved by:
Correct Answer Virtual private networks
Your Answer Virtual private networks
Multiple Choice Multiple Answer Question What are the various tags used in HTML
Correct Answer Font style , Font size , Hypertext links
Your Answer Font style , Font size , Hypertext links
Match The FollowingQuestion Correct Answer Your Answer
Satellite Space orbit Space orbit
Radio Frequency range Frequency range
Infrared Light waves Light waves
Microwave Repeater station Repeater station
True/False Question Every file on the internet has a unique
URL. Correct Answer True
Your Answer True
Select The Blank Question In application gateway only ________ has
access to the outside internet Correct Answer Main host
Your Answer Main host
Select The Blank Question In a track ball the user uses his ________
to move the exposed ball. Correct Answer Thumb
Your Answer Finger
True/False Question Storage area network are configured to
provide access to one server. Correct Answer False
Your Answer False
Multiple Choice Single Answer Question Fiber optic channels can send data to sites
upto : Correct Answer 10 Km
Your Answer 10 Km
Multiple Choice Single Answer Question As you expand your connectivity it has
been observed that there is a high rate of problems occur with respect to :
Correct Answer Security
Your Answer Security
Select The Blank Question Network Attached Storage devices
generally run ________ operating system. Correct Answer Embedded
Your Answer UNIX
Multiple Choice Single Answer Question To have a successful communication of
data mandatorily we require : Correct Answer Sender & Reciever
Your Answer Sender & Reciever
Multiple Choice Multiple Answer Question If the data transmitted is in ASCII code, the
frame will consist of : Correct Answer Start of header (soh) , End of transmission
(eot) , Data Your Answer Start of header (soh) , End of transmission
(eot) , Data
Match The FollowingQuestion Correct Answer Your Answer
Fiber Optic Cable Glass Cladding Glass Cladding
Sheilded Twisted Pair
Token Ring Network
Token Ring Network
Unsheilded Twisted Pair
Ethernet Network Ethernet Network
Coaxial Cable Television Cable Network
Television Cable Network
True/False Question IP routing protocol are dynamic protocol.
Correct Answer False
Your Answer True
Total no of wrong ans =5 where last quests ans is wrong LIST OF ATTEMPTED QUESTIONS AND ANSWERS
True/False Question Digital computers are programmable machines.
Correct Answer
True
Your Answer True
Multiple Choice Multiple Answer Question Hardware components of a personal computer
will consist of a Correct Answer
Hard Disk , Mouse , Floppy
Your Answer Hard Disk , Mouse , Floppy
Multiple Choice Multiple Answer Question What additional features are present in
JavaScript which were not present in HTML. Correct Answer
Moving tickers , Drop-down menus , Mouse-over interactions
Your Answer Drop-down menus , Mouse-over interactions
Multiple Choice Single Answer Question Producing documents over the web is done
using Correct Answer
Hypertext markup language
Your Answer Hypertext markup language
Select The Blank Question Flowcharts usually help the programmers to
establish healthy communication channel with the ________.
Correct Answer
Business Managers
Your Answer None of the Above
Select The Blank Question The WWW is a system of internet servers that
support ________ to access several internet protocols on a single interface.
Correct Answer
Hypertext
Your Answer Hypertext
Multiple Choice Single Answer Question A software application that uses a network
adapter card to send packets over a LAN is called :
Correct Answer
Packet sniffer
Your Answer Packet sniffer
Multiple Choice Multiple Answer Question FTP sites are mainly used for transfer of
information such as Correct Answer
Softwares , Games , Databases
Your Answer Databases
Multiple Choice Multiple Answer Question When configuring a star topology the network
designer oftenly makes it easy to : Correct Answer
Add new stations , Monitoring issues , Accommodate different design cables
Your Answer Add new stations , Monitoring issues , Accommodate different design cables
Multiple Choice Multiple Answer Question Choose the devices which can be used to Input
data into a computer. Correct Answer
Keyboard , Mouse , Scanner
Your Answer Keyboard , Mouse , Scanner
True/False Question The procedure to convert data into information is
called processing. Correct Answer
True
Your Answer True
Multiple Choice Single Answer Question RAID disks and tape technology are used for
improved : Correct Answer
Reliability
Your Answer Reliability
Multiple Choice Multiple Answer Question Three ways of transmitting data from one place
to another are : Correct Answer
Simplex , Half-Duplex , Full-Duplex
Your Answer Simplex , Half-Duplex , Full-Duplex
True/False Question Rich site summary can be accessed from any
computer that is connected to LAN. Correct Answer
False
Your Answer False
True/False Question Storage area network are configured to provide
access to one server. Correct Answer
False
Your Answer True
Multiple Choice Single Answer Question Fiber optic channels can send data to sites
upto : Correct Answer
10 Km
Your Answer 10 Km
Multiple Choice Single Answer Question It is a network security issue, when sensitive
information about the organization is send to: Correct Answer
Competitors
Your Answer Competitors
Select The Blank Question Demand priority uses ________ signaling.
Correct Answer
Quartet
Your Answer Quartet
Multiple Choice Multiple Answer Question Automated management and monitoring tools
helps in : Correct Answer
Fault identification , Isolation of cause , Fixatation of error
Your Answer Fault identification , Isolation of cause , Fixatation of error , Data replication
Multiple Choice Single Answer Question A technique in which a certain set of predefined
symbols are used to represent the flow of data is known as
Correct Answer
Flowcharting
Your Answer Flowcharting
Multiple Choice Single Answer Question XML is a mark-up language which enables web
designers to create Correct Answer
Tags
Your Answer Tags
Select The Blank Question Shopping over the internet is possible with
________ web sites. Correct Answer
E-commerce
Your Answer E-commerce
Multiple Choice Multiple Answer Question A computer program usually refers to a
Correct Answer
Logical Sequence , Set of Instructions , Functional unit
Your Answer Logical Sequence , Set of Instructions , Functional unit
Multiple Choice Single Answer Question Every NIC has a Unique identifier which is
hardcoded and is used to uniquely identify it, it is referred as :
Correct Answer
MAC Address
Your Answer MAC Address
Select The Blank Question An ________ is the most popular form of
network communication system. Correct Answer
Your Answer E-mail
Select The Blank
Question Computers on the internet use ________ architecture.
Correct Answer
Client/server
Your Answer Network
Multiple Choice Single Answer Question Storage area network systems transfer data in
the form of Correct Answer
Disk blocks
Your Answer Packets
True/False Question A network consists of group of computers
connected each other to share the processing speed of the server and implement software modules.
Correct Answer
False
Your Answer True
Select The Blank Question SAN make the storage available across the
network on ________ basis. Correct Answer
Many-to-many
Your Answer One-to-one
True/False Question VoIP is likely to take over the traditional phone
system. Correct Answer
True
Your Answer True
Select The Blank Question Network attached storage products generally
hide the ________ of the devices. Correct Answer
Operating system
Your Answer Capacity
Select The Blank Question URL's can have a variety of ________
structures describing the data.
Correct Answer
Elaborate
Your Answer Elaborate
Multiple Choice Multiple Answer Question Internet control message protocol generates
which all types of messages ? Correct Answer
Destination unreachable , Time exceeded , Router Solicitation
Your Answer Destination unreachable , Time exceeded , Router Solicitation
True/False Question Flowcharts help the programmers in executing
the program. Correct Answer
False
Your Answer False
Select The Blank Question NAS add's features from the ________
direction. Correct Answer
Bottom
Your Answer Bottom
Match The FollowingQuestion Correct Answer Your Answer
Third Generation IC IC
Forth Generation MicroChip MicroChip
First Generation Vaccume Tubes Vaccume Tubes
Second Generation Transistors Transistors
Multiple Choice Multiple Answer Question Communication devices available for instant
compability with desktop computers specifically for transfer data through :
Correct Answer
USB , Bluetooth , Wi-FI
Your Answer USB , Bluetooth , Wi-FI
True/False Question Alterations in the program leads to complete
redrawing of the program flowcharts. Correct True
Answer Your Answer False
Multiple Choice Multiple Answer Question Protocol feature programs allow users to
Correct Answer
Retrive Information , Search Information
Your Answer Retrive Information , Search Information
Multiple Choice Multiple Answer Question What are the nature of attacks on a system's
security over a network ? Correct Answer
Unauthorized access , Misuse of resources , Insert spurious packets
Your Answer Unauthorized access , Misuse of resources , Insert spurious packets , Access data
True/False Question It is not possible to expand a network once the
setup is complete. Correct Answer
False
Your Answer False
Multiple Choice Single Answer Question When the network is spread across the buildings
it is called as Correct Answer
Wide Area Network
Your Answer Local Area Network
Multiple Choice Single Answer Question SAN connects storage devices to a
heterogeneous set of servers for Correct Answer
Sharing resources
Your Answer Sharing resources
Multiple Choice Single Answer Question A lost token error occurs when a token
Correct Answer
Hangs up
Your Answer Hangs up
Match The Following
Question Correct Answer Your Answer
VoIP Lease line Lease line
Wi-Fi Wireless card Wireless card
SAN Fiber Channels Ethernet Connection
NAS Ethernet Connection External card
Select The Blank Question Tokens on a network are usually ________
bytes in length. Correct Answer
3
Your Answer 3
True/False Question In demand priority media access method the
terminals cannot send and receive data at the same time.
Correct Answer
False
Your Answer False