File Name: computer network objective question and answer file type .zip
Those who score great in it stands higher on the merit. Collection of hardware components and computers B. Interconnected by communication channels C. Sharing of resources and information D. All of the Above. The physical boundary of Network B. An operating System of Computer Network C. A system designed to prevent unauthorised access D.
A web browsing Software 3 How many layers. Dynamic Host Control Protocol B. Dynamic Host Configuration Protocol C. Dynamic Hyper Control Protocol D. Dynamic Hyper Configuration Protocol. Dynamic Name System B. Dynamic Network System C. Domain Name System D. Domain Network Service. The transmission capacity of communication channels B.
Connected Computers in the Network C. Class of IP used in Network D. None of Above. Asymmetric Dual Subscriber Line B. Asymmetric Digital System Line C. Asymmetric Dual System Line D. Asymmetric Digital Subscriber Line. All of the above. Layer 1 Physical Layer B. Layer 3 Network Layer C. Layer 4 Transport Layer D. Layer 7 Application Layer. Only Source address B. Only Destination address C. Source and Destination address D. Source or Destination address. Transport, Session, Presentation, Application B.
Network, Transport, Session, Presentation C. Datalink, Network, Transport, Session D. Physical, Datalink, Network, Transport. Network bit — 14, Host bit — 16 B. Network bit — 16, Host bit — 14 C. Network bit — 18, Host bit — 16 D. Network bit — 12, Host bit — Unicast address B.
Network address C. Broadcast address D. None of the above. A packet may be lost B. Packets may arrive out of order C.
Duplicate packets may be generated D. Network bits 7, Host bits 24 B. Network bits 8, Host bits 24 C. Network bits 7, Host bits 23 D. Network bits 8, Host bits Forwards a packet to all outgoing links B. Forwards a packet to the next free outgoing link C.
Determines on which outing link a packet is to be forwarded D. Forwards a packet to all outgoing links except the originated link. Cell switched network B. Packet-switched network D. A protocol defines what data is communicated. A protocol defines how data is communicated. A protocol defines when data is communicated. It divides one large network into several smaller ones B. It divides a network into network classes C.
It speeds up the speed of a network D. Physical layer B. Datalink layer C. Network layer D. Transport layer. File Sharing B. Easier access to Resources C. Easier Backups D. What is the use of Ping command? To test a device on the network is reachable B. To test a hard disk fault C. To test a bug in an Application D. To test a Pinter Quality. Port Assignments to network devices C.
Distribute IP address to network devices D. Routes to use for forwarding data to its destination. The difference in wire colour B. The difference in the number of wires C. Just different length of wires D. Just different manufacturer standards. Four wire pairs connect to the same pin on each end B. Four wire pairs not twisted with each other D. The cable which is not twisted. Front-door Threats B.
Backdoor Threats C. Underground Threats D. Denial of Service DoS. The area surrounded by secured servers D. The area surrounded by the Military. Redundant Array of Independent Disks B.
Redundant Array of Important Disks C. Random Access of Independent Disks D. Random Access of Important Disks. It means addressing a packet to all machine B. It means addressing a packet to some machine C.
The process of transferring files from a computer on the Internet to your computer is called. Downloading Basic Computer Knowledge Quiz. Which was the first electronic computer constructed at the more School of Engineering? Which of the following uses icons and menus displayed on the screen to send command to the computer system? Which of the following device is used to avoid loading during read operation?
To hide the internal implementation of an object we use …. This section contain Computer Graphics multiple choice questions and answers quiz - computer graphics quiz questions answers, computer graphics mcqs, mcqs question of computer graphics, computer graphics mcq for ugc net, computer graphics mcqs questions, computer graphics exam questions and answers, computer graphics numerical Answer: a Bytecode is executed by the JVM. Explanation: The output of the Java compiler is bytecode, which leads to the security and portability of the Java code. It is a highly developed set of instructions that are designed to be executed by the Java runtime system known as Java Virtual Machine JVM. Part I.
Computer networks is one of the most important chapter for any candidate pursuing career in information technology field. Having solid background information and a good practice with quality MCQ questions enables you to score highest in any competitive examination. Don't forget to download the PDF file so that you can practice while you're offline. Before you start leaning multiple choice questions, read the pages below for Computer Networks chapter. They will help you to grasp the concept and enable to understand why particular option is selected as correct answer. You can download printable version above page as PDF file. You are also encouraged to visit and check the short questions from Computer Networks chapter.
Explain different Data flow directions. The host in the question is in the 0 subnet, which has a broadcast address of since is the next subnet. A network is recursively is a connection of two or more nodes by a physical link or two or more networks connected by one or more nodes. CS Notes Syllabus all 5 units notes are uploaded here. It is developing a P2P point-to-point connection between all the devices of the network.
Network Hardware b. Network Software c. Protocol d. None of these.
Computer forensics is the use of digital evidence to solve a crime. Digital forensics is a techno-legal field and the author of the digital forensic report has to be deposed as an expert witness in the court of law. The activities in the workbook move through the various stages of forensic examinations. Practice Test: Question Set - 01 1. Don't forget to include the link of the quiz you encountered.
Those who score great in it stands higher on the merit.
Explanation: The RSC is a standard interface for serial data transmission that defines the protocol and physical interface for transmitting serial data fairly easily between associated appliances and computers. Explanation: The star topology is the best network topology for large businesses because it is simple to control and coordinate from the central computer. Explanation: Double duplex is not a legitimate channel for transmission in computer network. Explanation: The parity bit is also known as the check bit, and has a value of 0 or 1. It is used for error detection for blocks of data. Explanation: The optical fiber is made of glass or plastic.
We have compiled the most frequently asked Networking Interview Questions and Answers that will help you to prepare for the Networking basics interview questions that an interviewer might ask you during your interview. In this list of Networking interview questions, we have covered all commonly asked basic and advanced interview questions on networking with detailed answers to help you clear the job interview. This detailed guide of Network Engineer interview questions will help you to crack your Job interview easily. A link refers to the connectivity between two devices.
The organization is striving for the Rights for All, Empowered communiteies, especially women and children and a just.