Documente Academic
Documente Profesional
Documente Cultură
1. ARPANET
2. Bill Rogers
3. Bill Gates
4. Microsoft
World Wide Web was proposed by
1. Bill Gates
2. ARPANET
3. Tim Berners-Lee
4. Bill Rogers
What are the uses of the Internet?
1. Communication
2. Information Retrieval
3. Presentation of Information
4. All of the above
.net domain is used for
1. educational institution
2. Internet infrastructure and service providers
3. International organizations
4. None Of the above
What is the full form of URL?
1. Uniform Resource Library
2. Uniform Resource Locators
3. United Resource Library
4. United Resource Locators
Benefits of Email are?
1. Speed
2. Cost
3. Record keeping
4. All of the above
WWW provides standardized access to
1. GOPHER
2. TELNET
3. FTP
4. All of the above
Which of these are not a internet browser?
1. Netscape Navigator
2. Chrome
3. Drupal
4. Opera
What should be minimum requirement of random access memory (RAM) for
internet access?
1. 8 MB
2. 16 MB
3. 32 MB
4. 64 MB
A modem is not needed when accessing the Internet through
1. LAN
2. Wi Fi
3. Cable
4. None Of the above
In order to use cable for browsing web you will need :
1. A cable modem
2. Network Interface Card (NIC)
3. Both 1 & 2
4. None Of the above
ADSL gives
1. faster downloading speeds (receiving) than uploading speeds (sending).
2. slower downloading speeds (receiving) than uploading speeds (sending).
3. .net
4. .in
Today all modems are made in which technology
1. X2
2. KFlex
3. V.90
4. None of the above
What is the full form of http?
1. HyperText Transmission Protocol
2. HyperText Transfer Protocol
3. HyperTerminal Transport Protocol
4. HyperTerminal Transfer Protocol
IRC stands for
1. Internet Related Chat
2. Internet Relay Chat
3. Internet Related Content
4. None of the above
Which of these are Types of Internet connections
1. SLIP
2. DIAS
3. PPP
4. All of the above
Which of these are disadvantage of DSL connection?
1. The speed is much higher than a regular modem
2. You can leave your Internet connection open and still use the phone line
for voice calls.
3. A DSL connection works better when you are closer to the providers
central office.
4. 3. DSL doesnt necessarily require new wiring; it can use the phone line
you already have.
A new solution USB allows a user to install up to how many devices on the
computer
1. 64
2. 127
3. 128
4. 256
In general, any connection to the customer of how much bandwidth is considered
broadband Internet.
1. 56 kbps
2. 64 kbps
3. 128 kbps
4. 256 kbps
What is teh full form of ADSL
1. asymmetric digital subscriber line
2. asymmetric data subscriber line
3. asymmetric digital subscriber loop
4. asymmetric data subscriber loop
System of embedding links in a text to link to other text?
1. Embedded Linking
2. HTM
3. HTTP
4. None of the above
Cable modem is capable of delivering up to
1. 56 kbps
2. 256 kbps
3. 2 mbps
4. 30-40mbps
DSLAM stands for
1. DSL access multiplexer
2. DSL asymmetric multiplexer
3. DSL asynchronous multiplexer
4. None of the above
What is needed to have an access to broadband?
1. Modem
2. Keyboard
3. Mouse
4. None of the above
The DSLAMs are connected to the
1. Tier 1 Switches
2. Tier 2 Switches
3. Tier 3 Switches
4. None of the above
Tier1 Switch is connected to
1. DSLAM
2. BRAS
3. NIB
4. NOC
"Broadband Remote Access Server": (BBRAS
Maximum frequency range of a copper pair is in
1. Kilo Hertz
2. Mega Hertz
3. Giga Hertz
4. Terra Hertz
DSLAM refers to
1. DSL Authentication Multiplexer
2. DSL Application Multiplexer
3. DSL Access Multiplexer
4. None of the above
What is common between X.25 Packet switching and Fast Packet Switching
1. In both of them bandwidth is used only when there is something to
transmit
2. Both supports high speed data (T1 speed and up)
3. Both supports sharing of the same channel to carry voice , data and video
4. In both of them transmit delays are low enough to handle voice traffic
ATM is
1. a frame relay implementation
While routing
1. destination physical address changes every hop
2. destination physical and IP addresses changes every hop
3. source IP address changes every hop
4. destination IP address changes every hop
ICMP
1. messages are encapsulated in an IP header
2. reports only on errors and problems
3. is integral part of TCP
4. is integral part of UDP
Domain Name System
1. tries to resolve names with root name servers first
2. can be used in local environments
3. provides mapping from Human-readable names to MAC addresses
4. each root name server who can?t resolve the name sends the request to
the hierarchically upper server
which of the following is not provided by DHCP
1. IP address
2. ARP tables
3. subnet mask
4. DNS server address
RIP was popular because
1. intended for use on large, long-haul networks
2. has unbounded number of hops
3. it was distributed with Berkeley UNIX
4. RFC finally appeared in 1998
RIP
1. requires more memory than OSPF
2. provides load balancing
3. is implemented less than OSPF
4. has an advantage in a small network
OSPF (Open Shortest Path First)
C. Media Failure
D. Rollback failure
Answer & Explanation
Answer: Option B
Explanation:
No answer description available for this question. Let us
discuss.
View Answer Workspace Report Discuss in Forum
2.
3.
4.
5.
a True, b False
Ans : False
9. Constraints cannot be exported through EXPORT command
a True, b False
Ans : False
10. It is very difficult to grant and manage common privileges needed by
different groups of database users
using the roles
a True, b False
Ans : False
11. What is difference between a DIALOG WINDOW and a DOCUMENT
WINDOW regarding
moving the window with respect to the application window
a Both windows behave the same way as far as moving the window is
concerned.
b A document window can be moved outside the application window while
a dialog window
cannot be moved
c A dialog window can be moved outside the application window while a
document window
cannot be moved
Ans : C
12 . What is the difference between a MESSAGEBOX and an ALERT
a A messagebox can be used only by the system and cannot be used in user
application while an
alert can be used in user application also.
b A alert can be used only by the system and cannot be use din user
application while an messagebox
can be used in user application also.
c An alert requires an response from the userwhile a messagebox just
flashes a message
and only requires an acknowledment from the user
d An message box requires an response from the userwhile a alert just
flashes a message an only
requires an acknowledment from the user
Ans : C
13. Which of the following is not an reason for the fact that most of the
processing is done at the server ?
a To reduce network traffic. b For application sharing, c To implement
business rules centrally,
d None of the above
Ans : D
14. Can a DIALOG WINDOW have scroll bar attached to it ?
a Yes, b No
Ans : B
15. Which of the following is not an advantage of GUI systems ?
a. Intuitive and easy to use., b. GUI?s can display multiple applications in
multiple windows
c. GUI?s provide more user interface objects for a developer d. None of the
above
Ans
16. What is the difference between a LIST BOX and a COMBO BOX ?
a In the list box, the user is restricted to selecting a value from a list but in a
combo box the user can
23. Which of the following is TRUE for the ENFORCE KEY field
a ENFORCE KEY field characterstic indicates the source of the value that
SQL*FORMS uses
to populate the field
b A field with the ENFORCE KEY characterstic should have the INPUT
ALLOWED
charaterstic turned off
a Only 1 is TRUE
b Only 2 is TRUE
c Both 1 and 2 are TRUE
d Both 1 and 2 are FALSE
Ans : A
24. What is the maximum size of the page ?
a Characters wide & 265 characters length
b Characters wide & 265 characters length
c Characters wide & 80 characters length
d None of the above
Ans : B
25. A FORM is madeup of which of the following objects
a block, fields only,
b blocks, fields, pages only,
c blocks, fields, pages, triggers and form level procedures,
d Only blocks.
Ans : C
26. For the following statements which is true
1 Page is an object owned by a form
2 Pages are a collection of display information such as constant text and
graphics.
a Only 1 is TRUE
b Only 2 is TRUE
c Both 1 & 2 are TRUE
d Both are FALSE
Ans : B
27. The packaged procedure that makes data in form permanent in the
Database is
a Post
b Post form
c Commit form
d None of the above
Ans : C
28. Which of the following is TRUE for the SYSTEM VARIABLE $$date$
$
a Can be assigned to a global variable
b Can be assigned to any field only during design time
c Can be assigned to any variable or field during run time
d None of the above
Ans : B
9. Which of the following packaged procedure is UNRESTRICTED ?
a CALL_INPUT, b CLEAR_BLOCK, c EXECUTE_QUERY, d
USER_EXIT
Ans : D
30. Identify the RESTRICTED packaged procedure from the following
a USER_EXIT, b MESSAGE, c BREAK, d EXIT_FORM
Ans : D
31. What is SQL*FORMS
a SQL*FORMS is a 4GL tool for developing & executing Oracle based
interactive applications.
b SQL*FORMS is a 3GL tool for connecting to the Database.
c SQL*FORMS is a reporting tool
d None of the above.
Ans : A
32. Name the two files that are created when you generate a form using
Forms 3.0
a FMB & FMX, b FMR & FDX, c INP & FRM, d None of the above
Ans : C
33. What is a trigger
a A piece of logic written in PL/SQL
b Executed at the arrival of a SQL*FORMS event
c Both A & B
d None of the above
Ans : C
34. Which of the folowing is TRUE for a ERASE packaged procedure
1 ERASE removes an indicated Global variable & releases the memory
associated with it
2 ERASE is used to remove a field from a page
1 Only 1 is TRUE
2 Only 2 is TRUE
3 Both 1 & 2 are TRUE
4 Both 1 & 2 are FALSE
Ans : 1
35. All datafiles related to a Tablespace are removed when the Tablespace is
dropped
a TRUE
b FALSE
Ans : B
36. Size of Tablespace can be increased by
a Increasing the size of one of the Datafiles
b Adding one or more Datafiles
c Cannot be increased
d None of the above
Ans : B
37 . Multiple Tablespaces can share a single datafile
a TRUE
b FALSE
Ans : B
38 . A set of Dictionary tables are created
a Once for the Entire Database
b Every time a user is created
c Every time a Tablespace is created
d None of the above
Ans : A
39. Datadictionary can span across multiple Tablespaces
a TRUE
b FALSE
Ans : B
Ans : C
45. A database trigger doesnot apply to data loaded before the definition of
the trigger
a TRUE
b FALSE
Ans : A
46. Dedicated server configuration is
a One server process - Many user processes
b Many server processes - One user process
c One server process - One user process
d Many server processes - Many user processes
Ans : C
47. Which of the following does not affect the size of the SGA
a Database buffer
b Redolog buffer
c Stored procedure
d Shared pool
Ans : C
48. What does a COMMIT statement do to a CURSOR
a Open the Cursor
b Fetch the Cursor
c Close the Cursor
d None of the above
Ans : D
49. Which of the following is TRUE
Ans : C
56. Is it possible to open a cursor which is in a Package in another
procedure ?
a Yes
b No
Ans : A
57. Is it possible to use Transactional control statements in Database
Triggers?
a Yes
b No
Ans : B
58. Is it possible to Enable or Disable a Database trigger ?
a Yes
b No
Ans : A
59. PL/SQL supports datatype(s)
a Scalar datatype
b Composite datatype
c All of the above
d None of the above
Ans C
60. Find the ODD datatype out
a VARCHAR2
b RECORD
c BOOLEAN
d RAW
Ans : B
61. Which of the following is not correct about the |TABLE| datatype ?
a Can contain any no of columns
b Simulates a One-dimensional array of unlimited size
c Column datatype of any Scalar type
d None of the above
Ans : A
62. Find the ODD one out of the following
a OPEN
b CLOSE
c INSERT
d FETCH
Ans C
63. Which of the following is not correct about Cursor ?
a Cursor is a named Private SQL area
b Cursor holds temporary results
c Cursor is used for retrieving multiple rows
d SQL uses implicit Cursors to retrieve rows
Ans : B
64. Which of the following is NOT VALID in PL/SQL ?
a Select ? into
b Update
c Create
d Delete
Ans : C
65. What is the Result of the following ?VIK?||NULL||?RAM? ?
a Error
b VIK RAM
c VIKRAM
d NULL
Ans : C
66. Declare
a number := 5; b number := null; c number := 10;
Begin
if a > b AND a ( Select count(*) from Emp E2 where E1.SAL > E2.SAL )
will retrieve
a 3500,5000,2500
b 5000,2850
c 2850,5750
d 5000,5750
Ans : A
72. Is it possible to modify a Datatype of a column when column contains
data ?
a Yes
b No
Ans B
73. Which of the following is not correct about a View ?
a To protect some of the columns of a table from other users
a Yes
b No
Ans : B
94. What type of file is used for porting Forms 4.5 applications to various
platforms ?
a . FMB file
b . FMX file
c . FMT file
d . EXE file
Ans : C
95. What built_in procedure is used to get IMAGES in Forms 4.5 ?
a READ_IMAGE_FILE
b GET_IMAGE_FILE
c READ_FILE
d GET_FILE
Ans A
96. When a form is invoked with CALL_FORM does Oracle forms issues
SAVEPOINT ?
a Yes
b No
Ans : A
97. Can we attach the same LOV to different fields in Design time ?
a Yes
b No
Ans : A
98. How do you pass values from one form to another form ?
a LOV
b Parameters
c Local variables
d None of the above
Ans : B
99. Can you copy the PROGRAM UNIT into an Object group ?
a Yes
b No
Ans : B
100. Can MULTIPLE DOCUMENT INTERFACE (MDI) be used in Forms
4.5 ?
a Yes
b No
Ans : A
101. When is a .FMB file extension is created in Forms 4.5 ?
a Generating form
b Executing form
c Save form
d Run form
Ans : C
Ans : B
106. Can an Alert message be changed at runtime ?
a Yes
b No
Ans : A
107. Can we create an LOV without an RECORD GROUP ?
a Yes
b No
Ans : B
108. How many no of columns can a RECORD GROUP have ?
a 10
b 20
c 50
d None of the above
Ans D
109. Oracle precompiler translates the EMBEDDED SQL statemens into
a Oracle FORMS
b Oracle REPORTS
c Oracle LIBRARY
d None of the above
Ans : D
110. Kind of COMMENT statements placed within SQL statements ?
a Asterisk(*) in column ?
a Yes
b No
Ans : A
118.What are the SQL clauses supported in the link property sheet ?
a WHERE & START WITH
b WHERE & HAVING
c START WITH & HAVING
d WHERE, START WITH & HAVING
Ans : D
119. What are the types of Calculated columns available ?
a Summary, Place holder & Procedure column
b Summary, Procedure & Formula columns
c Procedure, Formula & Place holder columns
d Summary, Formula & Place holder columns
Ans.: D
120. If two groups are not linked in the data model editor, what is the
hierarchy between them?
a There is no hierarchy between unlinked groups
b The group that is right ranks higher than the group that is to theleft
c The group that is above or leftmost ranks higher than the group that is to
right or below it
d None of the above
Ans : C
121. Sequence of events takes place while starting a Database is
Answer:a
Explanation:None.
2. What is stat frame delimeter (SFD) in ethernet frame?
a) 10101010
b) 10101011
c) 00000000
d) 11111111
View Answer
Answer:b
Explanation:None.
3. MAC address is of
1) 24 bits
b) 36 bits
c) 42 bits
d) 48 bits
View Answer
Answer:d
Explanation:None.
4. What is autonegotiation?
a) a procedure by which two connected devices choose common transmission
parameters
b) a security algorithm
c) a routing algorithm
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
5. Ethernet in metropolitan area network (MAN) can be used as
a) pure ethernet
Answer:d
Explanation:None.
9. What is interframe gap?
a) idle time between frames
b) idle time between frame bits
c) idle time between packets
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
10. An ethernet frame that is less than the IEEE 802.3 minimum length of 64
octets is called
a) short frame
b) run frame
c) mini frame
d) man frame
View Answer
Answer:b
Explanation:None.
This section of our 1000+ Computer Networks MCQs focuses on network layer.
1. The network layer concerns with
a) bits
b) frames
c) packets
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
Answer:a
Explanation:None.
3. Network layer firewall works as a
a) frame filter
b) packet filter
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
4. Network layer firewall has two sub-categories as
a) stateful firewall and stateless firewall
b) bit oriented firewall and byte oriented firewall
c) frame firewall and packet firewall
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
5. WPA2 is used for security in
a) ethernet
b) bluetooth
c) wi-fi
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
6. An attempt to make a computer resource unavailable to its intended users is
called
a) denial-of-service attack
b) virus attack
c) worms attack
d) botnet process
View Answer
Answer:a
Explanation:None.
7. Extensible authentication protocol is authentication framework frequently used
in
a) wired personal area network
b) wireless networks
c) wired local area network
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
8. Pretty good privacy (PGP) is used in
a) browser security
b) email security
c) FTP security
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
9. PGP encrypts data by using a block cipher called
a) international data encryption algorithm
b) private data encryption algorithm
c) intrenet data encryption algorithm
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
10. When a DNS server accepts and uses incorrect information from a host that
has no authority giving that information, then it is called
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
1. OSI stands for
a) open system interconnection
b) operating system interface
c) optical service implementation
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
2. The OSI model has ___ layers.
a) 4
b) 5
c) 6
d) 7
View Answer
Answer:d
Explanation:None.
3. TCP/IP model does not have ______ layer but OSI model have this layer.
a) session layer
b) presentation layer
c) application layer
d) both (a) and (b)
View Answer
Answer:d
Explanation:None.
4. Which layer links the network support layers and user support layers
a) session layer
b) data link layer
c) transport layer
d) network layer
View Answer
Answer:c
Explanation:Physical, data link and network layers are network support layers
and session, presentation and application layers are user support layers.
5. Which address is used in an internet employing the TCP/IP protocols?
a) physical address and logical address
b) port address
c) specific address
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
6. TCP/IP model was developed _____ the OSI model.
a) prior to
b) after
c) simultaneous to
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
7. Which layer is responsible for process to process delivery?
a) network layer
b) transport layer
c) session layer
d) data link layer
View Answer
Answer:b
Explanation:None.
8. Which address identifies a process on a host?
a) physical address
b) logical address
c) port address
d) specific address
View Answer
Answer:c
Explanation:None.
9. Which layer provides the services to user?
a) application layer
b) session layer
c) presentation layer
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
10. Transmission data rate is decided by
a) network layer
b) physical layer
Answer:a
Explanation:None.
4. The portion of physical layer that interfaces with the media access control
sublayer is called
a) physical signalling sublayer
b) physical data sublayer
c) physical address sublayer
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
5. physical layer provides
a) mechanical specifications of electrical connectors and cables
b) electrical specification of transmission line signal level
c) specification for IR over optical fiber
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
6. In asynchronous serial communication the physical layer provides
a) start and stop signalling
b) flow control
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
7. The physical layer is responsible for
a) line coding
b) channel coding
c) modulation
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
8. The physical layer translates logical communication requests from the ______
into hardware specific operations.
a) data link layer
b) network layer
c) trasnport layer
d) application layer
View Answer
Answer:a
Explanation:None.
9. A single channel is shared by multiple signals by
a) analog modulation
b) digital modulation
c) multiplexing
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
10. Wireless transmission can be done via
a) radio waves
b) microwaves
c) infrared
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
1. The data link layer takes the packets from _____ and encapsulates them into
frames for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
View Answer
Answer:a
Explanation:None.
2. Which one of the following task is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding
View Answer
Answer:d
Explanation:None.
3. Which sublayer of the data link layer performs data link functions that depend
upon the type of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
Answer:a
Explanation:None.
1. Transport layer aggregates data from different applications into a single stream
before passing it to
a) network layer
b) data link layer
c) application layer
d) physical layer
View Answer
Answer:a
Explanation:None.
2. Which one of the following is a transport layer protocol used in internet?
a) TCP
b) UDP
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
3. User datagram protocol is called connectionless because
a) all UDP packets are treated independently by transport layer
b) it sends data as a stream of related packets
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
4. Transmission control protocol is
a) connection oriented protocol
Answer:a
Explanation:None.
8. A _____ is a TCP name for a transport service access point.
a) port
b) pipe
c) node
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
9. Transport layer protocols deals with
a) application to application communication
b) process to process communication
c) node to node communication
d) none of the mentioned
View Answer
10. Which one of the following is a transport layer protocol?
a) stream control transmission protocol
b) internet control message protocol
c) neighbor discovery protocol
d) dynamic host configuration protocol
View Answer
Answer:a
Explanation:None.
1. The ____ translates internet domain and host names to IP address.
a) domain name system
b) routing information protocol
c) network time protocol
d) internet relay chat
View Answer
Answer:a
Explanation:None.
2. Which one of the following allows a user at one site to establish a connection
to another site and then pass keystrokes from local host to remote host?
a) HTTP
b) FTP
c) telnet
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
3. Application layer protocol defines
a) types of messages exchanged
b) message format, syntax and semantics
c) rules for when and how processes send and respond to messages
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
4. Which one of the following protocol delivers/stores mail to reciever server?
a) simple mail transfer protocol
b) post office protocol
c) internet mail access protocol
d) hypertext transfer protocol
View Answer
Answer:a
Explanation:None.
5. The ASCII encoding of binary data is called
a) base 64 encoding
b) base 32 encoding
c) base 16 encoding
d) base 8 encoding
View Answer
Answer:a
Explanation:None.
6. Which one of the following is an internet standard protocol for managing
devices on IP network?
a) dynamic host configuration protocol
b) simple newtwork management protocol
c) internet message access protocol
d) media gateway protocol
View Answer
Answer:b
Explanation:None.
7. Which one of the following is not an application layer protocol?
a) media gateway protocol
b) dynamic host configuration protocol
c) resource reservation protocol
d) session initiation protocol
View Answer
Answer:c
Explanation:None.
8. Which protocol is a signalling communication protocol used for controlling
multimedia communication sessions?
a) session initiation protocol
b) session modelling protocol
c) session maintenance protocol
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
9. Which one of the following is not correct?
a) application layer protocols are used by both source and destination devices
during a communication session
b) application layer protocols implemented on the source and destination host
must match
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
10. When displaying a web page, the application layer uses the
a) HTTP protocol
b) FTP protocol
c) SMTP protocol
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
1. The network layer concerns with
a) bits
b) frames
c) packets
d) none of the mentioned
View Answer
Answer:c
Explanation:None.