ALL THE BEST!!!
COMPUTER HWNW HO AGRA DEC BATCH 9 -05TH MARCH 2025
1 / 50
The primary goal of the......................protocol is to provide a private channel between
2 / 50
Which of the following is the logical topology?
3 / 50
The................is used to provide integrity check, authentication and encryption to IP datagram.
4 / 50
MSI stands for
5 / 50
Coded entries which are used to gain access to a computer system are called
6 / 50
What is the speed of a standard Ethernet network?
7 / 50
Which of the transport layer protocols is connectionless?
8 / 50
Ethernet system uses which of the following technology.
9 / 50
The............................. Is a collection of protocols designed by Internet Engineering Task Force(IETF) toprovide security for a packet at the Network level.
10 / 50
The term ‘Computer’ is derived from..........
11 / 50
The data unit in the TCP/IP layer called a .....
12 / 50
Which of the following are the network services?
13 / 50
Which protocol is used to send emails?
14 / 50
ALU is
15 / 50
IBM 1401 is
16 / 50
Which of the following statements is true?
17 / 50
..........is a combination of hardware and software that facilitates the sharing of information between computing devices.
18 / 50
VGA is
19 / 50
A network that needs human beings to manually route signals is called....
20 / 50
Another name for Usenet is
21 / 50
What is the role of a firewall?
22 / 50
The loss in signal power as light travels down the fiber is called .............
23 / 50
What is the commonly used unit for measuring the speed of data transmission?
24 / 50
Which device breaks up collision domains?
25 / 50
What does MAC in MAC address stand for?
26 / 50
State whether the following is True or False.
i) In bus topology, heavy Network traffic slows down thebusspeed.
ii) It is multipoint configuration.
27 / 50
Which of the following is/ are the drawbacks of Ring Topology?
28 / 50
Which type of memory is used for BIOS?
29 / 50
What is the primary function of a switch in a network?
30 / 50
What does DHCP stand for?
31 / 50
Which of the communication modes support two way traffic but in only once direction of a time?
32 / 50
What is the binary equivalent of the decimal number 10?
33 / 50
What layer of the OSI model handles encryption?
34 / 50
Which is a network layer protocol?
35 / 50
If all devices are connected to a central hub, then topology is called.
36 / 50
Which device amplifies and regenerates signals in a network?
37 / 50
The standard suit of protocols used by the Internet, Intranets, extranets andsome other networks.
38 / 50
What is a subnet mask used for?
39 / 50
CD-ROM stands for
40 / 50
FDDI used which type of physical topology?
41 / 50
Which of the following applications allows a user to access and change remote files without actual transfer?
42 / 50
Which of the following controls the process of interaction between the user and the operating system?
43 / 50
What is the maximum length of a Cat5 cable?
44 / 50
What is the default port for HTTP?
45 / 50
The first computers were programmed using
46 / 50
TCP/IP ..................layer corresponds to the OSI models to three layers.
47 / 50
FTP stands for
48 / 50
Which of the following TCP/IP protocols is used for transferring files form one machine to another.
49 / 50
In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one.
50 / 50
At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ……………….