MCQ of Computer Networking with answer set-4

0

1. Which of the following is not the layer of TCP/IP protocol?
A) Application Layer
B) Session Layer
C) Transport Layer
D) Internetwork layer

 2. ................... address use 7 bits for the <network> and 24 bits for the <host> portion of the IP address.
A) Class A
B) Class B
C) Class C
D) Class D


3. ............. addresses are reserved for multicasting.
A) Class B
B) Class C
C) Class D
D) Class E

4. State the following statement is true or false.
i) In class B addresses a total of more than 1 billion addresses can be formed.
ii) Class E addresses are reserved for future or experimental use.
A) True, False
B) True, True
C) False, True
D) False, False

5. Which of the following statement is true?
i) An address with all bits 1 is interpreted as all networks or all hosts.
ii) The class A network 128.0.0.0 is defined as the loopback network.
A) i only
B) ii only
C) Both A and B
D) None of the above

6. Which is not the Regional Internet Registers (RIR) of the following?
A) American Registry for Internet Numbers (ARIN)
B) Europeans Registry for Internet Numbers (ERIN)
C) Reseaux IP  Europeans (RIPE)
D) Asia Pacific Network Information Centre (APNIC)

7. Match the following IEEE No to their corresponding Name for IEEE 802 standards for LANs.
i) 802.3                                  a) WiFi
ii) 802.11                              b) WiMa
iii) 802.15.1                          c) Ethernet
iv) 802.16                             d) Bluetooth
A) i-b, ii-c, iii-d, iv-a
B) i-c, ii-d, iii-a, iv-b
C) i-c, ii-a, iii-d, iv-b
D) i-b, ii-d, iii-c, iv-a

8. ........... was the first step in the evolution of Ethernet from a coaxial cable bus to hub managed, twisted pair network.
A) Star LAN
B) Ring LAN
C) Mesh LAN
D) All of the above

9. ............... is the predominant form of Fast Ethernet, and runs over two pairs of category 5 or above cable.
A) 100 BASE-T
B) 100 BASE-TX
C) 100 BASE-T4
D) 100 BASE-T2

10. IEEE 802.3ab defines Gigabit Ethernet transmission over unshielded twisted pair (UTP) category 5, 5e or 6 cabling known as ....................
A) 1000 BASE-T
B) 1000 BASE-SX
C) 1000 BASE-LX
D) 1000 BASE-CX

Answers:
1.       B) Session Layer
2.       A) Class A
3.       C) Class D
4.       B) True, True
5.       A) i only
6.       B) Europeans .....  (ERIN)
7.       C) i-c, ii-a, iii-d, iv-b
8.       A) Star LAN
9.       B) 100 BASE-TX
10.   A) 1000 BASE-T

For other more MCQs: Click Here

Solved MCQ of Computer networking set-3

0

1. In mesh topology, relationship between one device and another is ..............
A) Primary to peer
B) Peer to primary
C) Primary to secondary
D) Peer to Peer

2. The performance of data communications network depends on ..............
A) Number of users
B) The hardware and software
C) The transmission
D) All of the above


3. Find out the OSI layer, which performs token management.
A) Network Layer
B) Transport Layer
C) Session Layer
D) Presentation Layer

4. The name of the protocol which provides virtual terminal in TCP/IP model is.
A) Telnet
B) SMTP
C) HTTP

5. The layer one of the OSI model is
A) Physical layer
B) Link layer
C) Router layer
D) Broadcast layer

6. What is the name of the network topology in which there are bi-directional links between each possible node?
A) Ring
B) Star
C) Tree
D) Mesh

7. What is the commonly used unit for measuring the speed of data transmission?
A) Bytes per second
B) Baud
C) Bits per second
D) Both B and C

8. Which of the communication modes support two way traffic but in only once direction of a time?
A) Simplex
B) Half-duplex
C) Three - quarter's duplex
D) Full duplex

9. The loss in signal power as light travels down the fiber is called .............
A) Attenuation
B) Propagation
C) Scattering
D) Interruption

10. Which of the following TCP/IP protocols is used for transferring files form one machine to another.
A) FTP
B) SNMP
C) SMTP
D) RPC

Answers:
1.   D) Peer to Peer
2.   D) All of the above
3.   C) Session Layer
4.   A) Telnet
5.   A) Physical layer
6.   D) Mesh
7.   B) Baud
8.   B) Half-duplex
9.   A) Attenuation
10.   A) FTP

You may also wanted to view the following related posts
You can view the following other posts
For other more MCQs: Click Here

MCQ of Computer Networking with answer set-2

0

1. A network that needs human beings to manually route signals is called....

A) Fiber Optic Network         B) Bus Network

C) T-switched network           D) Ring network



2. TCP/IP ................. layer corresponds to the OSI models to three layers.

A) Application          B) Presentation

C) Session                 D) Transport



3. Which of the transport layer protocols is connectionless?

A) UDP                      B) TCP

C) FTP                       D) Nvt



4. Which of the following applications allows a user to access and change remote files without actual transfer?

A) DNS                     B) FTP

C) NFS                     D) Telnet



5. The data unit in the TCP/IP layer called a .....

A) Message             B) Segment

C) Datagram           D) Frame



6. DNS can obtain the ................. of host if its domain name is known and vice versa.

A) Station address       B) IP address

C) Port address            D) Checksum



7. Which of the following OSI layers correspond to TCP/IP's application layer?

A) Application           B) Presentation

C) Session                 D) All of the above




8. Devices on one network can communicate with devices on another network via a .......

A) File Server            B) Utility Server

C) Printer Server        D) Gateway



9. A communication device that combines transmissions from several I/O devices into one line is a


A) Concentrator         B) Modifier

C) Multiplexer           D) Full duplex file



10. Which layers of the OSI determines the interface often system with the user?

A) Network              B) Application

C) Data link             D) Session



11. Which of the following of the TCP/IP protocols is the used for transferring files from one machine to another?

A) FTP                 C) SNMP

B) SMTP             D) Rpe



12. In which OSI layers does the FDDI protocol operate?

A) Physical       B) Data link

C) Network       D) A and B



13. In FDDI, data normally travel on ..................

A) The primary ring          B) The Secondary ring

C) Both rings                     D) Neither ring



14. The ............layer of OSI model can use the trailer of the frame for error detection.

A) Physical                 B) Data link

C) Transport               D) Presentation



15. In a ................topology, if there are n devices in a network, each device has n-1 ports for cables.

A) Mesh                  B) Star

C) Bus                     D) Ring



16. Another name for Usenet is

A) Gopher            B) Newsgroups

C) Browser           D) CERN



17. The standard suit of protocols used by the Internet, Intranets, extranets and some other networks.

A) TCP/IP               B) Protocol

C) Open system      D) Internet work processor



18. State whether the following is True or False.

i) In bus topology, heavy Network traffic slows down the bus speed.

ii) It is multipoint configuration.


A) True, True           B) True, False

C) False, True         D) False, False



19. Which of the following is the logical topology?

A) Bus                    B) Tree

C) Star                   D) Both A and B



20. Which of the following is/ are the drawbacks of Ring Topology?

A) Failure of one computer, can affect the whole network

B) Adding or removing the computers disturbs the network activity.

C) If the central hub fails, the whole network fails to operate.

D) Both of A and B


Answers:


1. C) T-switched network
2. A) Application
3. A) UDP
4. C) NFS
5. D) Frame
6. B) IP address
7. D) All of the above
8. D) Gateway
9. C) Multiplexer
10. B) Application
11. A) FTP
12. D) A and B
13. A) The primary ring
14. A) Physical
15. A) Mesh
16. B) Newsgroups
17. A) TCP/IP
18. A) True, True
19. C) Bus
20. D) Both of A and B

Related Posts:

For other more Multiple Choice Questions(MCQs): Click Here

Solved MCQ of Computer networking set-1

0

1.  The computer network is
A) Network computer with cable
B) Network computer without cable
C) Both of the above
D) None of the above

2. FDDI used which type of physical topology?
A) Bus
B) Ring
C) Star
D) Tree


3. FTP stands for
A) File transfer protocol
B) File transmission protocol
C) Form transfer protocol
D) Form transmission protocol


4. Ethernet system uses which of the following technology.
A) Bus
B) Ring
C) Star
D) Tree

5. Which of the following are the network services?
A) File service
B) Print service
C) Database service
D) All of the above

6. If all devices are connected to a central hub, then topology is called
A) Bus Topology
B) Ring Topology
C) Star Topology
D) Tree Topology

7. FDDI stands for
A) Fiber Distributed Data Interface
B) Fiber Data Distributed Interface
C) Fiber Dual Distributed Interface
D) Fiber Distributed Data Interface

8. Which of the following is an application layer service?
A) Network virtual terminal
B) File transfer, access and management
C) Mail service
D) All of the above
9. Which is the main function of transport layer?
A) Node to node delivery
B) End to end delivery
C) Synchronization
D) Updating and maintaining routing tables

10. The ............ layer change bits onto electromagnetic signals.
A) Physical
B) Transport
C) Data Link
D) Presentation

Answers:
1.       C) Both of the above
2.       B) Ring
3.       A) File transfer protocol
4.       A) Bus
5.       D) All of the above

6.       C) Star Topology
7.       A) Fiber Distributed... Interface
8.       C) Mail service
9.       B) End to end delivery
10.   A) Physical

MCQ of Database Management System with answer set-4

0

1. In SQL, which command is used to issue multiple CREATE TABLE, CREATE VIEW and GRANT statements in a single transaction?

A) CREATE PACKAGE

B) CREATE SCHEMA

C) CREATE CLUSTER

A) All of the above


2. In SQL, the CREATE TABLESPACE is used

A) to create a place in the database for storage of scheme objects, rollback segments, and naming the data files to comprise the tablespace.

B) to create a database trigger.

C) to add/rename data files, to change storage

D) All of the above


3. Which character function can be used to return a specified portion of a character string?

A) INSTR

B) SUBSTRING

C) SUBSTR

D) POS


4. Which of the following is TRUE for the System Variable $date$?

A) Can be assigned to a global variable.

B) Can be assigned to any field only during design time.

C) Can be assigned to any variable or field during run time.

D) Can be assigned to a local variable.


5. What are the different events in Triggers?

A) Define, Create

B) Drop, Comment

C) Insert, Update, Delete

D) Select, Commit


6. Which is the subset of SQL commands used to manipulate Oracle Database Structures, including tables?

A) Data Definition Language

B) Data Manipulation Language

C) Data Described Language

D) Data Retrieval Language


7. The SQL statement SELECT SUBSTR('123456789', INSTR('abcabcabc','b'), 4) FROM EMP; prints

A) 6789

B) 2345

C) 1234

D) 456789


8. Which of the following SQL command can be used to modify existing data in a database table?

A) MODIFY

B) UPDATE

C) CHANGE

D) NEW


9. When SQL statements are embedded inside 3GL, we call such a program as ..........

A) nested query

B) nested programming

C) distinct query

D) embedded SQL


10. ................ provides option for entering SQL queries as execution time, rather than at the development stage.

A) PL/SQL

B) SQL*Plus

C) SQL

D) Dynamic SQL



11) The RDBMS terminology for a row is

A. tuple

B. relation

C. attribute

D. degree


12) To change column value in a table the ......... command can be used.

A. create

B. insert

C. alter

D. update


13) The full form of DDL is

A. Dynamic Data Language

B. Detailed Data Language

C. Data Definition Language

D. Data Derivation Language


14) To pass on granted privileges to other user the ...... clause is used

A. create option

B. grant option

C. update option

D. select option


15) A set of possible data values is called

A. attribute

B. degree

C. tuple

D. domain


16) ......... is critical in formulating database design.

A. row column order

B. number of tables

C. functional dependency

D. normalizing


17) A primary key if combined with a foreign key creates

A. Parent-Child relationship between the tables that connect them

B. Many to many relationship between the tables that connect them

C. Network model between the tables that connect them

D. None of the above


18) A ............. represents the number of entities to which another entity can be associated

A. mapping cardinality

B. table

C. schema

D. information


19) Which two files are used during operation of the DBMS

A. Query languages and utilities

B. DML and query language

C. Data dictionary and transaction log

D. Data dictionary and query language


20) A ........... is a set of column that identifies every row in a table.

A. composite key

B. candidate key

C. foreign key

D. super key

 

Answers:


1. B) CREATE SCHEMA
2. A) to create a place in the database for storage of scheme objects, rollback segments, and naming  the data files to comprise the table-space.
3. C) SUBSTR
4. B) Can be assigned to any field only during design time.
5. C) Insert, Update, Delete
6. A) Data Definition Language
7. B) 2345
8. B) UPDATE
9. D) embedded SQL
10.D) Dynamic SQL
11) A. tuple
12) D. update
13) C. Data Definition Language
14) B. grant option
15) D. domain
16) C. functional dependency
17) A. Parent-Child relationship between the tables that connect them
18) A. mapping cardinality
19) C. Data dictionary and transaction log
20) D. super key


Related Posts

For other more Multiple Choice Questions (MCQs): Click Here

MCQ of Operating System with answer set-2

0

1. The first batch operating system was developed in the ................. by General Motors for use on an IBM 701.
A) mid 1940's
B) mid 1950's
C) mid 1960's
D) mid  1970's

2. Process is ........................
A) A program in execution
B) An instance of a program running on a computer.
C) The entity that can be assigned to and executed
D) All of the above.


3. ................... is a facility that allows programmers to address memory from a logical point of view, without regard to the main memory, physically available.
A) Visual memory
B) Real memory
C) Virtual memory
D) Secondary memory


4. ............ is a large kernel, including scheduling file system, networking, device drivers, memory management and more.
A) Monolithic kernel
B) Micro kernel
C) Macro kernel
D) Mini kernel

5. A .................... architecture assigns only a few essential functions to the kernel,  including address spaces, Inter process communication(IPC) and basic scheduling.
A) Monolithic kernel
B) Micro kernel
C) Macro kernel
D) Mini kernel

6. State whether true or false.
 i) Multithreading is useful for application that perform a number of essentially independent tasks that do not be serialized.
ii) An example of multithreading is a database server that listens for and process numerous client request.
A) i-True, ii-False
B) i-True, ii-True
C) i-False, ii-True
D) i-False, ii-False

7. With ................ only one process can execute at a time; meanwhile all other process are waiting for the processer. With .............. more than one process can be running simultaneously each on a different processer.
A) Multiprocessing, Multiprogramming
B) Multiprogramming, Uniprocessing
C) Multiprogramming, Multiprocessing
D) Uniprogramming, Multiprocessing

8. The two central themes of modern operating system are ...............
A) Multiprogramming and Distributed processing
B) Multiprogramming and Central Processing
C) Single Programming and Distributed processing
D) None of above

9. ............... refers to the ability of multiple process (or threads) to share code, resources or data in such a way that only one process has access to shared object at a time.
A) Synchronization
B) Mutual Exclusion
C) Dead lock
D) Starvation

10. ................. is the ability of multiple process to co-ordinate their activities by exchange of information
A) Synchronization
B) Mutual Exclusion
C) Dead lock
D) Starvation

Answers:
1.       B) mid 1950's
2.       D) All of the above.
3.       C) Virtual memory
4.       A) Monolithic kernel
5.       B) Micro kernel
6.       B) i-True, ii-True
7.       C) Multi.......Multiprocessing
8.       A) Multiprogra ......processing
9.       B) Mutual Exclusion
10.   A) Synchronization

You may also wanted to view the following related posts

Solved MCQ of Operating System Principles set-1

0

1. Which of the following is/ are the part of operating system?
A) Kernel services
B) Library services
C) Application level services
D) All of the above

2. The system of ............... generally ran one job at a time. These were called single stream batch processing.
A) 40's
B) 50's
C) 60's
D) 70's


3. In ............. generation of operating system, operating system designers develop the concept of multi-programming in which several jobs are in main memory at once.
A) First
B) Second
C) Third
D) Fourth


4. State True or False.
i) In spooling high speed device like a disk is interposed between running program and low-speed device in Input/output.
ii) By using spooling for example instead of writing directly to a printer, outputs are written to the disk.
A) i-True, ii-False
B) i-True, ii-True
C) i-False, ii-True
D) i-False, ii-False

5. Which of the following is/are the functions of operating system?
i) Sharing hardware among users.            ii) Allowing users to share data among themselves.
iii) Recovering from errors.                          iv) Preventing users from interfering with one another.
v) Scheduling resources among users.
A) i, ii, iii and iv only
B) ii, iii, iv and v only
C) i, iii, iv and v only
D) All i, ii, iii, iv and v

6. .................. executes must frequently and makes the fine grained decision of which process to execute the next.
A) Long-term scheduling
B) Medium-term scheduling
C) Short-term scheduling
D) None of the above

7. With ................ a page is brought into main memory only when the reference is made to a location on that page.
A) demand paging
B) main paging
C) prepaging
D) postpaging

8. ....................... provides a larger sized of virtual memory but require virtual memory which provides multidimensional memory.
A) Paging method
B) Segmentation method
C) Paging and segmentation method
D) None of these

9. ............... is a large kernel containing virtually the complete operating system, including, scheduling, file system, device drivers and memory management.
A) Multilithic kernel
B) Monolithic kernel
C) Micro kernel
D) Macro kernel

10. ............... is a large operating system core provides a wide range of services.
A) Multilithic kernel
B) Monolithic kernel
C) Micro kernel
D) Macro kernel
Answers:
1.       D) All of the above
2.       B) 50's
3.       C) Third
4.       B) i-True, ii-True
5.       D) All i, ii, iii, iv and v
6.       C) Short-term scheduling
7.       A) demand paging
8.       B) Segmentation method
9.       B) Monolithic kernel
10.   D) Macro kernel


You may also wanted to view the following related posts
For other more MCQs: Click Here
يتم التشغيل بواسطة Blogger.