Search This Blog

Sunday, May 27, 2018

Computer gk 27 may

Q.1. Which one is a valid IP address?

(1) 300.215.317.3 

(2) 302.215.417.5 

(3) 202.50.20.148 

(4) 202-5-20-148 

(5) None of these 

Q.2. Which type of transmission media is known as regular telephone wire?

(1) Wi-Fi 

(2) Twisted-pair wire 

(3) Fiber optic cable 

(4) Coaxial cable 

(5) All 

Q.3. What is the purpose of a firewall on a computer?

(1) To protect a computer from unauthorized access 

(2) To protect a computer in case of fire 

(3) To protect a computer from spam 

(4) All of the above 

(5) None of these 

Q.4. Which of the following layer is not in OSI model?

(1) Physical layer 

(2) Internet layer 

(3) Network layer 

(4) Transport layer 

(5) Application layer

Q.5. Copper wire is an example of?

(1) Guided Transmission Media 

(2) Shield Media 

(3) Group Media 

(4) Unguided Transmission Media 

(5) None of these 

Q.6. An unauthorized user is a network _______ issue.

(1) Performance 

(2) Reliability 

(3) Security 

(4) Firewall 

(5) None of these 

Q.7. Which topology requires a central controller or hub?

(1) Mesh 

(2) Star 

(3) Bus 

(4) Ring 

(5) Tree 

Q.8. Which topology requires a multipoint connection?

(1) Mesh 

(2) Star 

(3) Bus 

(4) Ring 

(5) Tree 

Q.9. Which of the following refers to a small, single-site network?

(1) LAN 

(2) DSL 

(3) RAM 

(4) USB 

(5) CPU

Q.10. Computers connected to a LAN 

(Local Area Network) can—

(1) Run faster 

(2) Go on line 

(3) Share information and/or share peripheral equipment 

(4) E-mail 

(5) None of these 

ANSWERS

Q.1. (3) 202.50.20.148 

Q.2. (2) Twisted-pair wire of transmission media is known as regular telephone wire.

Q.3. (1) To protect a computer from unauthorized access 

Q.4. (2) Internet layer 

Q.5. (1) Guided Transmission Media 

Q.6. (3) Security 

Q.7. (2) Star 

Q.8. (3) Bus topology requires a multipoint connection.

Q.9. (1) Local Area Network refer to a small, single-site network.

Q.10. (3) Computers connected to a LAN (Local Area Network) can share information and/ or share peripheral equipment.

No comments:

Post a Comment