Sunteți pe pagina 1din 3

Q1.

Which of the following topologies provides a highly fault-tolerant


architecture?
(a) Star
(b) Bus
(c) Ring
(d) Mesh
(e) Tree

Q2. Which of the following statements is incorrect for TELNET?


(a) It is an application layer protocol.
(b) It does not provide security on its own.
(c) It provides encryption feature.
(d) It provides bidirectional text-oriented communication
(e) None of these

Q3. Which of the following techniques is used by unethical hackers to certify


fake data over the data over the Internet for stealing confidential information?
(a) Phishing
(b) Spear Phishing
(c) Logic Bomb
(d) Spoofing
(e) Cracking
Q4._______ ensures secure transfer of data over an unsecured network, such
as the Internet.
(a) Antivirus
(b) Hacking
(c) Cracking
(d) Spoofing
(e) Cryptography

Q5. Which of the following is/are the benefits of subnetting?


(a) Preservation of address space
(b) Reduced network traffic
(c) Better security
(d) Enhanced performance
(e) All of these

Q6. Which of the following techniques minimizes the interference between


wireless devices?
(a) FCS
(b) RTFS
(c) HCFS
(d) FSSH
(e) FHSS
Q7. How many IP addresses would be there in a block containing the mask
/28?
(a) 16
(b) 32
(c) 64
(d) 128
(e) 256
Q8. The phrase “greater than at least one” is represented in SQL by _____
(a) < all
(b) < some
(c) > all
(d) > some
(e) > 1

Q9. Predict the output of given C Program:


#include <stdio.h>

int main()
{
float c = 5.0;
printf ("Temperature in Fahrenheit is %.2f", (9.0/5.0)*c + 32);
return 0;
}
(a) Temperature in Fahrenheit is 41.00
(b) Temperature in Fahrenheit is 37.00
(c) Temperature in Fahrenheit is 0.00
(d) No Output
(e) Compiler Error

Q10. An HTTP connection uses port ______ whereas HTTPS uses port
______and invokes SSL.
(a) 40; 80
(b) 60; 620
(c) 80; 443
(d) 620; 80
(e) 60; 100

Q11. The outcome of Dijkstra’s calculation is used to populate the:


(a) Topology table
(b) Routing table
(c) Neighbour table
(d) Adjacency table
(e) Matrix Table

Q12. Data integrity constraints are used to:


(a) Control who is allowed access to the data
(b) Ensure that duplicate records are not entered into the table
(c) Improve the quality of data entered for a specific property
(d) Prevent users from changing the values stored in the table
(e) Check for authorisation

Q13. The computation of the shortest path in OSPF is usually done by:
(a) Bellman-ford algorithm
(b) Routing information protocol
(c) Dijkstra’s algorithm
(d) Distance vector routing
(e) Routing Information Protocol
Q14. What is the range of data type short in Java?
(a) -128 to 127
(b) -32768 to 32767
(c) -2147483648 to 2147483647
(d) -32768 to 2147483647
(e) None of the mentioned

Q15. Big Data and Analytics can be effective in collecting information about
financial fraud. Which of the following is a characteristic of Big data?
(a) Volume
(b) Variety
(c) Velocity
(d) Veracity
(e) All of the above

Q16. Siri, Cortana, Alexa become hugely popular in this decade. Which of the
following are related technology?
(a) Speech Recognition
(b) Robotics
(c) Cloud Technology
(d) Reality 4D
(e) All of the above

Q17. _____are often used to stop bots and other automated programs from
using blogs to affect search engine rankings, signing up for e-mail accounts to
send out spam or take part in on-line polls.
(a) Malware
(b) Firewall
(C) CAPTCHA
(d) biometrics
(e) Automation

Q18. Pokémon Go app an immensely popular game allowed people to wander


around their hometowns and score points by interacting with characters within
the confines of a game, then going to real-life places to make progress in virtual
environments. Which of the following is related technology?
(a) Artificial Intelligence
(b) Virtual Reality
(c) Augmented Reality
(d) Sleeker
(e) None of these

Q19. Which type of the following is used to for controlling, monitoring, or


assisting the operation of equipment?
(a) Business software
(b) Embedded Software
(c) Personal/Entertainment Software
(d) System Software
(e) None of these

Q20. The domain name system is maintained by


(a) distributed database system
(b) a single server
(c) a single computer
(d) System Software
(e) None of the above

S-ar putea să vă placă și