Search This Blog

Sunday, May 27, 2018

Computer gk 27 may

Q.1. Which one is a valid IP address?

(1) 300.215.317.3 

(2) 302.215.417.5 

(3) 202.50.20.148 

(4) 202-5-20-148 

(5) None of these 

Q.2. Which type of transmission media is known as regular telephone wire?

(1) Wi-Fi 

(2) Twisted-pair wire 

(3) Fiber optic cable 

(4) Coaxial cable 

(5) All 

Q.3. What is the purpose of a firewall on a computer?

(1) To protect a computer from unauthorized access 

(2) To protect a computer in case of fire 

(3) To protect a computer from spam 

(4) All of the above 

(5) None of these 

Q.4. Which of the following layer is not in OSI model?

(1) Physical layer 

(2) Internet layer 

(3) Network layer 

(4) Transport layer 

(5) Application layer

Q.5. Copper wire is an example of?

(1) Guided Transmission Media 

(2) Shield Media 

(3) Group Media 

(4) Unguided Transmission Media 

(5) None of these 

Q.6. An unauthorized user is a network _______ issue.

(1) Performance 

(2) Reliability 

(3) Security 

(4) Firewall 

(5) None of these 

Q.7. Which topology requires a central controller or hub?

(1) Mesh 

(2) Star 

(3) Bus 

(4) Ring 

(5) Tree 

Q.8. Which topology requires a multipoint connection?

(1) Mesh 

(2) Star 

(3) Bus 

(4) Ring 

(5) Tree 

Q.9. Which of the following refers to a small, single-site network?

(1) LAN 

(2) DSL 

(3) RAM 

(4) USB 

(5) CPU

Q.10. Computers connected to a LAN 

(Local Area Network) can—

(1) Run faster 

(2) Go on line 

(3) Share information and/or share peripheral equipment 

(4) E-mail 

(5) None of these 

ANSWERS

Q.1. (3) 202.50.20.148 

Q.2. (2) Twisted-pair wire of transmission media is known as regular telephone wire.

Q.3. (1) To protect a computer from unauthorized access 

Q.4. (2) Internet layer 

Q.5. (1) Guided Transmission Media 

Q.6. (3) Security 

Q.7. (2) Star 

Q.8. (3) Bus topology requires a multipoint connection.

Q.9. (1) Local Area Network refer to a small, single-site network.

Q.10. (3) Computers connected to a LAN (Local Area Network) can share information and/ or share peripheral equipment.

Saturday, May 26, 2018

Computer gk 26 may

.1. Which one of the following is used as connect to the internet?

(1) Web browser 

(2) Net fitter 

(3) Windows 95 

(4) Cable 

(5) None of these 

Q.2. Which of the following communication mode support two way traffic but only in one direction at a time?

(1) Simplex 

(2) half-duplex 

(3) three-quaters duplex 

(4) All of the Above 

(5) None of these 

Q.3. Who decide about the division of work with respect to IT security ?

(1) Data owner 

(2) Senior Manager 

(3) Data Custodian 

(4) Data user 

(5) None of these 

Q.4. The user account can only be created by the -

(1) User 

(2) Network administrator 

(3) Security administrator 

(4) Project incharge 

(5) None of these 

Q.5. Digital signal used in ISDN have -

(1) Discrete value 

(2) Any value 

(3) whole no value 

(4) fractional value 

(5) None of these 

Q.6. Bandwidth means -

(1) Channel capacity 

(2) Data transmission 

(3) Cable length 

(4) All 

(5) None of these 

Q.7. Which of the following is NOT a type of broadband Internet connection?

(1) Cable 

(2) DSL 

(3) Dial-up 

(4) Satellite 

(5) None of these 

Q.8. Which of the following is not an example of security and privacy risk ?

(1) Hackers 

(2) Spam 

(3) Virus 

(4) Identity theft 

(5) None of these 

Q.9. A ____________ uses long-distance transmission media to link computers separated by distance.

(1) circuit-switching network 

(2) Wi-Fi 

(3) WAN 

(4) LAN 

(5) None of these 

Q.10. Which of the following is NOT considered as a network communications device?

(1) Network interface card (NIC) 

(2) Modem 

(3) Data bus 

(4) Router 

(5) None of these 

ANSWERS

Q.1. (4) Cable 

Q.2. (2) half-duplex 

Q.3. (2) Senior Manage or Chief information security officer 

(CISO) of IT assurance manager who is in charge of information security.

Q.4. (2) Network administrator 

Q.5. (1) Discrete value 

Q.6. (4) Bandwidth is the amount of data that can be transmitted along a channel during a specified period of time.

Q.7. (3) Dial-up 

Q.8. (2) Spam 

Q.9. (3) A WAN uses long-distance transmission media to link computers separated by distance.

Q.10. (3) Data Bus is NOT considered a network communications device.