ALL THE BEST!!!
EC MADURAI COMPUTER HW NW FEB BATCH2 -05TH APRIL 2025
1 / 50
________ is an important circuitry in a computer system that directs the operation of the processor.
2 / 50
Which of the following is an example of an input device?
3 / 50
A network that needs human beings to manually route signals is called....
4 / 50
The................is used to provide integrity check, authentication and encryption to IP datagram.
5 / 50
Which component allows the computer to connect to a network and access the internet?
6 / 50
FDDI stands for
7 / 50
The data unit in the TCP/IP layer called a .....
8 / 50
Which is the main function of transport layer?
9 / 50
What does SSD stand for in computing?v
10 / 50
Which of the following TCP/IP protocols is used for transferring files form one machine to another.
11 / 50
The............................. Is a collection of protocols designed by Internet Engineering Task Force(IETF) toprovide security for a packet at the Network level.
12 / 50
If all devices are connected to a central hub, then topology is called.
13 / 50
The term ‘Computer’ is derived from..........
14 / 50
What is the full form of PDF?
15 / 50
Which of the communication modes support two way traffic but in only once direction of a time?
16 / 50
The loss in signal power as light travels down the fiber is called .............
17 / 50
The digital telecommunications term ISDN is an abbreviation for ______.
18 / 50
Second generation of computers consist of which of following ?
19 / 50
What is the commonly used unit for measuring the speed of data transmission?
20 / 50
Which of the transport layer protocols is connectionless?
21 / 50
What is a LAN?
22 / 50
Another name for Usenet is
23 / 50
Which memory is known as volatile memory
24 / 50
What is a browser?
25 / 50
Which of the following is not a type of computer memory?
26 / 50
Which of the following is an application layer service?
27 / 50
28 / 50
What is the function of an operating system?
29 / 50
30 / 50
The............. layer change bits onto electromagnetic signals.
31 / 50
32 / 50
The primary goal of the......................protocol is to provide a private channel between
33 / 50
Which of the following applications allows a user to access and change remote files without actual transfer?
34 / 50
TCP/IP ..................layer corresponds to the OSI models to three layers.
35 / 50
What is the name of the network topology in which there are bi-directional links between each possible node?
36 / 50
37 / 50
Which of the following is the logical topology?
38 / 50
What does LAN stand for in computing?
39 / 50
FTP stands for
40 / 50
State whether the following is True or False.
i) In bus topology, heavy Network traffic slows down the bus speed.
ii) It is multipoint configuration.
41 / 50
At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ……………….
42 / 50
What kind of lock includes a keypad that can be used to control access into areas?
43 / 50
Which of the following is/ are the drawbacks of Ring Topology?
44 / 50
Which of the following are the network services?
45 / 50
In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one.
46 / 50
The standard suit of protocols used by the Internet, Intranets, extranets and some other networks.
47 / 50
FDDI used which type of physical topology?
48 / 50
Flash drive is popularly known as?
49 / 50
50 / 50
Ethernet system uses which of the following technology.