ALL THE BEST!!!
COMPUTER HWNW EC UDAIPUR JAN BATCH -03RD MARCH 2025
1 / 50
Which of the following is a network protocol?
2 / 50
Who is the inventor of “Difference Engine”?
3 / 50
What does the traceroute command do?
4 / 50
A CPU contains a.
5 / 50
Which of the following of the TCP/IP protocols is the used for transferring files from one machine to another?
6 / 50
Which of the following TCP/IP protocols is used for transferring files form one machine to another.
7 / 50
Match the following IEEE No to their corresponding Name for IEEE 802 standards for LANs. i) 802.3 a)Wi Fi ii) 802.11 b) WiMa iii) 802.15.1 c) Ethernet iv) 802.16 d) Bluetooth
8 / 50
What type of resource is most likely to be a shared common resource in a computer Network?
9 / 50
Who is the father of Computer science?
10 / 50
Which storage device is fastest?
11 / 50
What is the name of the network topology in which there are bi-directional links between each possible node?
12 / 50
What is a VLAN?
13 / 50
In which OSI layers does the FDDI protocol operate?
14 / 50
The............. layer change bits onto electromagnetic signals.
15 / 50
If all devices are connected to a central hub, then topology is called.
16 / 50
What does IP stand for?
17 / 50
What is the binary equivalent of the decimal number 10?
18 / 50
What is the main advantage of an SSD over an HDD?
19 / 50
is the predominant form of Fast Ethernet, and runs over two pairs of category 5 or above cable.
20 / 50
What is a subnet mask used for?
21 / 50
What is the commonly used unit for measuring the speed of data transmission?
22 / 50
UNIVAC is
23 / 50
Which is the main function of transport layer?
24 / 50
The............ layer of OSI model can use the trailer of the frame for error detection.
25 / 50
What is the primary purpose of a proxy server?
26 / 50
What is the speed of a standard Ethernet network?
27 / 50
Which protocol is used to send emails?
28 / 50
Which of the following is NOT a peripheral device?
29 / 50
Who is the father of Computer?
30 / 50
The loss in signal power as light travels down the fiber is called .............
31 / 50
Which protocol is used for secure web browsing?
32 / 50
Which device is required for the Internet connection?
33 / 50
Which of these is NOT an example of an operating system?
34 / 50
Which of the following is a layer-3 device?
35 / 50
In FDDI, data normally travel on
36 / 50
In a................ topology, if there are n devices in a network, each device has n-1 ports for cables.
37 / 50
FDDI stands for
38 / 50
What is the purpose of ARP?
39 / 50
You organize files by storing them in
40 / 50
Which protocol is used for file transfer over the internet?
41 / 50
............. was the first step in the evolution of Ethernet from a coaxial cable bus to hubmanaged,twisted pair network.
42 / 50
What is the default subnet mask for a Class A IP address?
43 / 50
IEEE 802.3ab defines Gigabit Ethernet transmission over unshielded twisted pair (UTP) category 5, 5e or 6 cabling known as ....................
44 / 50
What is a light pen?
45 / 50
Who is the father of personal computer?
46 / 50
Which of the following is an application layer service?
47 / 50
Which of the communication modes support two way traffic but in only once direction of a time?
48 / 50
Which is not the Regional Internet Registers (RIR) of the following?
49 / 50
Which device amplifies and regenerates signals in a network?
50 / 50
What does SSD stand for?