CBSE - MCQ Question Banks (के. मा. शि. बो . -प्रश्नमाला )

PreviousNext

Q. 191501 The term related to scanner is


A. laser.

B. twain.

C. cartridge.

D. media.

Right Answer is: B

SOLUTION

Twain is a standard software protocol and application programming interface (API) that regulates communication between software applications and imaging devices such as scanners and digital cameras.


Q. 191502 The address given to the computer connected to a network is called


A. system address.

B. SYSID.

C. process ID.

D. IP address.

Right Answer is: D

SOLUTION

IP address is recognized by a unique number connected to a network.


Q. 191503 When a product is purchased over a mobile phone, the transaction is known as


A. web-commerce.

B. e-commerce.

C. m-commerce.

D. mobile purchases.

Right Answer is: C

SOLUTION

The term m-commerce stands for mobile commerce, which means buying and selling of goods and services on the mobile.


Q. 191504 The machine slide rule was developed by


A. Mesopotamians.

B. John Napier.

C. Blaise pascal.

D. Leibnitz.

Right Answer is: B

SOLUTION

John Napier developed the concept of logarithm slide rule and Napier’s bones.


Q. 191505 The computers, which are also known as notebooks, are


A. special-purpose computers.

B. general-purpose computers.

C. PDAs.

D. laptop computers.

Right Answer is: D

SOLUTION

The notebooks are also called laptop computers because they can be carried in brief-cases.


Q. 191506 MAGNUM is an example of


A. minicomputer.

B. mainframe computer.

C. super computer.

D. microcomputers.

Right Answer is: A

SOLUTION

MAGNUM is a minicomputer which is more powerful than microcomputers in terms of processing power and capabilities.


Q. 191507 The combination of analog and digital computers is known as


A. analog-digital computer.

B. logical computer.

C. super-computer.

D. hybrid computer.

Right Answer is: D

SOLUTION

Hybrid computer have both the features of analog and digital computer. In these computers, some of the calculations are done in a analog manner and some in a digital manner.


Q. 191508 The unit which provides information from man to machine is called the


A. input.

B. output.

C. control.

D. main memory.

Right Answer is: A

SOLUTION

The input unit provides information from outside into the computer system.


Q. 191509 Bit is an abbreviation for the expression


A. binary information technology.

B. binary number.

C. binary digit.

D. bilingual number.

Right Answer is: C

SOLUTION

There are two binary digits 0 and 1, which in short, is known as bit.


Q. 191510 The instructions to the computer are given through


A. hardware.

B. programs.

C. input.

D. output.

Right Answer is: B

SOLUTION

Computer programs are instructions for a computer. All the instructions to the program are given in the form of code.


Q. 191511 The computers which deal with physical quantities are termed as


A. analog computers.

B. hybrid computers.

C. digital computers.

D. mini- computers.

Right Answer is: A

SOLUTION

In analog computers, computation is carried out with physical quantities such as voltage, length, current, temperature etc. They operate by measuring rather than counting.


Q. 191512 The computers that deal with discrete values are known as


A. analog computers.

B. hybrid computers.

C. digital computers.

D. mini-computers.

Right Answer is: C

SOLUTION

Digital computers convert the data into digits (0 and 1) and all the operations are carried out on these digits at extremely fast rates.


Q. 191513 The name pioneer computer is given to


A. CPU.

B. supercomputers.

C. analytical engine.

D. digital computers.

Right Answer is: C

SOLUTION

Analytical engine is called a pioneer computer because it was the first design to introduce the basic architecture of modern computers.


Q. 191514 The smallest measuring unit of memory is a


A. kilobyte.

B. megabyte.

C. gigabyte.

D. byte.

Right Answer is: D

SOLUTION

A byte can store one character in binary form i.e.1 byte means 8 bits.


Q. 191515 Punched card was fabricated by


A. Charles Babbage.

B. Herman Hollerith.

C. Von Neumann.

D. Herman Babbage.

Right Answer is: B

SOLUTION

Punched card was developed by Charles Babbage but was fabricated by Herman Hollerith.


Q. 191516 ANURAG is an example of


A. mini-computer.

B. macro-computer.

C. super-computer.

D. mainframe computer.

Right Answer is: C

SOLUTION

Super computers are the most powerful computers among digital computer. ANURAG is one of them.


Q. 191517 IPO cycle stands for


A. Input-Process-Output.

B. Input Process Organization.

C. Integrated Procedure Operation.

D. Integrated Procedure Output.

Right Answer is: A

SOLUTION

In IPO cycle, every operation undergoes three phases namely input, process and output.


Q. 191518 The concept of stored programs is developed by


A. Eckert.

B. Mauchly.

C. Neumann.

D. M.V. Wilkes.

Right Answer is: C

SOLUTION

Von Neumann gave the concept of stored program in which the machine instructions are stored with data internally.


Q. 191519 The ‘Father of Modern Computers’ is


A. Herman Hollerith.

B. Howard Aiken.

C. John Von Neumann.

D. Charles Babbage.

Right Answer is: D

SOLUTION

Charles Babbage’s great inventions of difference engine and analytical engine earned him the title of ‘Father of Modern Computers’ a fitting tribute to him.


Q. 191520 Fifth generation computer uses


A. parallel processing.

B. vacuum tube.

C. integrated circuit.

D. transistor.

Right Answer is: A

SOLUTION

Parallel processing concept is used in fifth generation computers. In this concept, many processors are grouped to function as one large group processor.


Q. 191521 The feature of artificial intelligence belongs to


A. second generation computers.

B. third generation computers.

C. fourth generation computers.

D. fifth generation computers.

Right Answer is: D

SOLUTION

The goal of fifth generation computers is to develop devices that respond to natural language input and are capable of learning and self-organization.


Q. 191522 Fourth generation computers used


A. VLSI circuits.

B. transistor.

C. vacuum tubes.

D. integrated circuit.

Right Answer is: A

SOLUTION

VLSI circuits pack about 50000 transistors in a chip which makes the computer smaller and faster.


Q. 191523 Third generation computers use


A. transistors.

B. integrated circuitry.

C. vacuum tubes.

D. built in error detecting devices.

Right Answer is: B

SOLUTION

An IC also known as chip is wafer thin slice of extremely purified silicon crystals.


Q. 191524 Second generation computers used


A. vacuum tubes.

B. integrated circuit.

C. transistor.

D. VLSI circuit.

Right Answer is: C

SOLUTION

Transistors are reliable as compared to vacuum tubes and they occupy less space.


Q. 191525 First generation computers used


A. vacuum tubes.

B. transistor.

C. magnetic tapes.

D. magnetic disks.

Right Answer is: A

SOLUTION

First generation computers used thermionic valves (vacuum tubes) and machine languages were used for giving instructions.


Q. 191526 One of the part of CPU is


A. ALU.

B. memory.

C. control unit.

D. input device.

Right Answer is: A

SOLUTION

ALU is one of the components of CPU which carries out arithmetic and logical operations.


Q. 191527 Storage of 1KB equals to


A. 1000 bytes.

B. 964 bytes.

C. 1024 bytes.

D. 1064 bytes.

Right Answer is: C

SOLUTION

One KB equals to 2^10 bytes i.e. 1024 bytes.


Q. 191528 Strength of computer to perform repetitive jobs is known as


A. accuracy.

B. speed.

C. reliablity.

D. versatility.

Right Answer is: D

SOLUTION

Computer system is versatile in nature. It can perform repetitive jobs efficiently.


Q. 191529 The central processing unit


A. is operated from the control panel.

B. is controlled by the input data entering the system.

C. controls the storage unit.

D. controls all input, output and processing.

Right Answer is: D

SOLUTION

CPU carries out the given process and supervises the entire system.


Q. 191530 A device which can store a symbol selected from a set of symbols is known as


A. integrated circuit.

B. arithmetic logical unit.

C. data processor.

D. memory cell.

Right Answer is: D

SOLUTION

The memory of a computer can be thought of as cells. Each of these cells is further broken into smaller parts known as bits. A number of bits together are used to store data instructions by the combination of 0 and 1.


Q. 191531 Nibble is a group of


A. 4 bits.

B. 8 bits.

C. 16 bits.

D. 64 bits.

Right Answer is: A

SOLUTION

Nibble is an order of 2^2 bits i.e. 4 bits.


Q. 191532 BIOS (Basic Input Output Instructions Services) is an example of


A. firmware.

B. hardware.

C. software.

D. liveware.

Right Answer is: A

SOLUTION

Firmware is prewritten program permanently stored in read-only memory that configures the computer and is not easily modifiable.


Q. 191533 The supercomputer which is not developed in India is


A. PARAM.

B. PACE.

C. VAX.

D. CDC-205.

Right Answer is: C

SOLUTION

VAX is not developed in India. It is a minicomputer, which is less powerful than a supercomputer.


Q. 191534 TAP stands for


A. Transfer Action Position.

B. Transformation of Active Point.

C. Terminal Access Point.

D. Termination Action Process.

Right Answer is: C

SOLUTION

TAP stands for Terminal Access Point. A terminal is provided that is capable of not sending a useless probe request to detect a stealth access point. The terminal communicates with a normal access point that reports a network identifier and a stealth access point that does not report a network identifier.


Q. 191535 NIU stands for


A. Nested Interactive Unit.

B. Nested Internet Unit.

C. Network Interactive Unit.

D. Network Interface Unit.

Right Answer is: D

SOLUTION

NIU stands for Network Interface Unit. It helps to establish communication between the server and the workstations.


Q. 191536 A program used to block the transmission of files "infected" by a virus, is


A. a firewall.

B. a cyber wall.

C. a virus wall.

D. an archie wall.

Right Answer is: C

SOLUTION

A virus wall is a program used to block the transmission of files "infected" by a virus. It is usually implemented as a WWW Proxy or Mail Relay. A virus wall may be considered to be a part of a firewall.


Q. 191537 CDMA stands for:


A. Character Desktop Main Area.

B. Code Durability Main Access.

C. Character Division Multiple Access.

D. Code Division Multiple Access.

Right Answer is: D

SOLUTION

Code Division Multiple Access (CDMA) is a channel access method utilized by various radio communication technologies.


Q. 191538 WLL stands for


A. Wired Local Lance.

B. World Local Loop.

C. Wired Local Loop.

D. Wireless Local Loop.

Right Answer is: D

SOLUTION

Wireless Local Loop (WLL), is a term for the use of a wireless communications link as the "last mile / first mile" connection for delivering plain old telephone service (POTS) and/or broadband Internet to telecommunications customers.


Q. 191539 GSM stands for


A. Great System Magic.

B. Global System Mark.

C. Great Source Of Management.

D. Global System Mobile.

Right Answer is: D

SOLUTION

GSM is the most popular standard for mobile phones in the world. Its promoter, the GSM Association, estimates that 80% of the global mobile market uses this standard.


Q. 191540 The capacity of a medium to transmit a signal is called


A. frequency.

B. bandwidth.

C. baud rate.

D. wavelength.

Right Answer is: B

SOLUTION

Bandwidth is a measure of available or consumed data communication resources expressed in bits/second or multiples of it (kilobits/s, megabits/s etc.).


Q. 191541 The advantage of bus topology is


A. short cable length.

B. centralization.

C. fault diagnosis.

D. use of hub.

Right Answer is: A

SOLUTION

Bus topology has a short cable length because there is a single common path connecting all the nodes.


Q. 191542 LAN stands for


A. Large Application Number.

B. Large Authorized Network.

C. Local Area Network.

D. Large Authorization Network.

Right Answer is: C

SOLUTION

A Local Area Network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport.


Q. 191543 OSI stands for


A. Operating System Interconnection.

B. Open Source Interconnection.

C. Open Systems Interconnections.

D. Operating Area Interconnections.

Right Answer is: C

SOLUTION

The Open Systems Interconnection Reference Model (OSI Reference Model or OSI Model) is an abstract description for layered communications and computer network protocol design.


Q. 191544 FTP stands for


A. File Transfer Protocol.

B. File Transaction Protocol.

C. Folder Time Delay.

D. Function Transfer Part.

Right Answer is: A

SOLUTION

File Transfer Protocol (FTP) is the name of a special set of protocols used by computers connected over the Internet to transfer files.


Q. 191545 WWW stands for


A. World Wide Workshop.

B. World Wide Web.

C. World Wide Warehouse.

D. World Wide Workstation.

Right Answer is: B

SOLUTION

The World Wide Web (commonly abbreviated as "the Web") is an elaborate set of interlinked hypertext documents accessed via the Internet.


Q. 191546 ARPANET is a research work sponsored by the


A. DoD.

B. Ddo.

C. Odd.

D. ODD.

Right Answer is: A

SOLUTION

The ARPANET (Advanced Research Projects Agency Network) developed by ARPA of the United States Department of Defense (DoD) during the Cold War, was the world's first operational packet switching network, and the predecessor of the global Internet.


Q. 191547 WEB pages


A. are generally written in HTML.

B. are stored on ISP servers.

C. can be opened without the browser.

D. can have the same URL.

Right Answer is: A

SOLUTION

A web page or webpage is a document or resource of information(written in HTML) that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a computer screen.


Q. 191548 Firewall


A. is used so that employees cannot surf the internet. 

B. destroys worms and viruses.

C. is a fireproof compartment.

D. protects against unauthorized access.

Right Answer is: D

SOLUTION

A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting outward communication. It is also a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all computer traffic between different security domains based upon a set of rules and other criteria.


Q. 191549 Cookies


A. are virus.

B. are self replicating.

C. are files sent by web servers.

D. offer protection against computer virus.

Right Answer is: C

SOLUTION

In computing, a cookie(also browser cookie, computer cookie, tracking cookie, web cookie, internet cookie and HTTPcookie) is a small string of text stored on a user's computer by a web browser.


Q. 191550 Hackers


A. gathers unauthorized information  with malicious intent.

B. break the security of a computer system.

C. damage the system they break into.

D. create viruses and introduce them into systems.

Right Answer is: B

SOLUTION

In common usage, a hacker is a person who breaks into computer.


Q. 191551 The statement that holds true for Video Conferencing is


A. Video conferencing is audio and video communication in real time.

B. Networking is not necessary for video conferencing.

C. E-mail is similar to chatting on the internet.

D. Web page and web site are synonyms.

Right Answer is: A

SOLUTION

A videoconference (also known as a videoteleconference) is a set of interactive telecommunication technologies, which allow two or more locations to interact via two-way video and audio transmissions simultaneously.


Q. 191552 An incorrect statement is


A. URL is the unique address of a file.

B. ISP is an important internet protocol.

C. HTTP is called a stateless protocol.

D. A browser is used to locate and display Web pages.

Right Answer is: B

SOLUTION

ISP is the Internet Service provider which offers access to internet.


Q. 191553 The Hyper Text Transfer Protocol


A. is used to create web pages.

B. is used by the browser to talk with a web server.

C. breaks a message into fixed sized packets.

D. marks the addresses on the packets.

Right Answer is: B

SOLUTION

Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. It is used for retrieving inter-linked resources led to the establishment of the World Wide Web.


Q. 191554 Discuss video conferencing.
A. is used to create web pages.
B. is used by the browser to talk with a web server.
C. breaks a message into fixed sized packets.
D. marks the addresses on the packets.

Right Answer is:

SOLUTION

Through video conferencing, two or more people who are far apart can communicate in real time, as though sitting face to face for a meeting. Besides the audio and visual transmission of activities, videoconferencing can be used to share documents, computer-displayed information, and whiteboards.  
The core technology used in a video-teleconference system is digital compression of audio and video streams in real time. The hardware or software that performs compression is called a codec (coder/decoder). Compression rates of up to 1:500 can be achieved. The resulting digital stream of 1s and 0s is subdivided into labelled packets, which are then transmitted through a digital network. 

The devices for video conferencing include:

for Video input   : video camera or webcam

for Video output : computer monitor , television or projector

for Audio input   : microphones

for Audio output : loudspeakers or telephone

for Data transfer: analog or digital telephone network, LAN or Internet

There are two kinds of video conferencing systems:

Dedicated systems that have all required components packaged into a single piece of equipment.

Desktop systems that are add-ons to normal PCs. Videoconferences carried out using PCs are also known as e-meetings.     

Videoconferencing has a great impact on education where it provides students with the opportunity to learn by participating in 2-way communication. Also, teachers from any where in the world can be brought to classes in remote or isolated places. Students can visit another part of the world to speak with others, visit a zoo, a museum, etc. In the field of medicine and healthcare, it can help in diagnosis, consulting, transmission of medical images. It can also be used to facilitate legal processing and business dealings.         


Q. 191555 What are the features of 3G  devices?
A. is used to create web pages.
B. is used by the browser to talk with a web server.
C. breaks a message into fixed sized packets.
D. marks the addresses on the packets.

Right Answer is:

SOLUTION

3G stands for third generation of wireless networks, combining high-speed mobile access, carrying voice and data (including video, text, multimedia). The 3G networks cover network technologies including GSM, CDMA, WCDMA, TDMA and WiMAX. The mobile network industry is keen to adopt 3G as it feels that multimedia based content is quickly becoming the norm. This includes services like - Music downloads , Mapping/navigation, Instant messaging, Web surfing, Email services  and Gaming. 
3G allows high bandwidth, packet based transmission at high data rates. EDGE (Enhanced Data rates for Global Evolution) is an interface that will make it possible for 3G devices to have high data transfer rates.                              


Q. 191556 How is the Ethernet Card different from Modem?
A. is used to create web pages.
B. is used by the browser to talk with a web server.
C. breaks a message into fixed sized packets.
D. marks the addresses on the packets.

Right Answer is:

SOLUTION

The Ethernet card allows your computer to connect to a network where all the systems are physically cabled together. It handles only digital signals.
A modem, also connects a computer to a network but it changes digital computer signals to analog signals for transfer over phone lines.
Network cards are thousands of times faster than a modem. A modem lets you connect to an ISP, a network card lets you connect to a network or even a modem.                                                

 


Q. 191557 Explain URL – its purpose and components.
A. is used to create web pages.
B. is used by the browser to talk with a web server.
C. breaks a message into fixed sized packets.
D. marks the addresses on the packets.

Right Answer is:

SOLUTION

URL, or Uniform Resource Locator, is the location of a file on the Web. When we type the address of a Web page in the browser, we give the URL.  
The most common format of a URL is  -  http://www.mytown.com/shopping/aasd1.html.  

The URL has two parts – the first part,  http:// gives the protocol used to locate the file on the Web.

Http represents the Hyper Text Transfer Protocol, which is used to transfer Web pages across the Internet to Web browsers such as Netscape Navigator, Internet Explorer, or Linux. The protocol is followed by a colon and two slashes (://). 
The portion of the URL following the protocol , here - www.mytown.com,

specifies the name of the host computer to access. WWW stands for World Wide Web. The right-most designator (here,  .com) describes the type of institution or organization.  

Following the host name, the directory structure and filename are mentioned. Here, shopping is a directory under the root directory of the host you are accessing. The file aasd1.html is located in this directory.        

 


Q. 191558 What steps can be taken to secure a network?
A. is used to create web pages.
B. is used by the browser to talk with a web server.
C. breaks a message into fixed sized packets.
D. marks the addresses on the packets.

Right Answer is:

SOLUTION

It is imperative to secure a network so that only authorized users and programs can access data. Some methods usually used are – 
Authorization – this checks whether the person wishing to use a resource has the permission to do so. This is done through logins.

Authentication – uses passwords to check that the logged in user is who he claims to be.

Use of Smart Cards – This card has details of the holder on it and generates a code that the computer can recognize. 

Use of Biometrics – using features that are unique to everybody, like finger prints, retina patterns to identify the user.

Firewall – restricting access to the network or specific computers through hardware and software.                         


Q. 191559 What is the difference between a web page, web site and web portal?
A. is used to create web pages.
B. is used by the browser to talk with a web server.
C. breaks a message into fixed sized packets.
D. marks the addresses on the packets.

Right Answer is:

SOLUTION

Web pages are generally created using html, and a collection of Web pages will form a website.  
A website is a destination whereas a web portal acts as an entry point to various services or resources. The portal will usually include a search facility, directory of other sites, news, e-mail, etc. For example, Yahoo.

Generally, there is no need to login into a website, it provides general information for any user who might visit. The portal will have a login facility and will provide information based on who you are.                     

 


Q. 191560 Describe the client / server architecture?
A. is used to create web pages.
B. is used by the browser to talk with a web server.
C. breaks a message into fixed sized packets.
D. marks the addresses on the packets.

Right Answer is:

SOLUTION

Businesses of various sizes have various computer needs. Large businesses generally have large computer setups, such as mainframes and networks. The network usually has a client-server architecture, which is a  type of division of labour for computing.
Under the client-server architecture, the server functions as the "brains" of the network, serving a group of client computers, commonly called workstations. The server will be a large-capacity computer, with a large amount of data and application software stored on it. The client computers are smaller  and have to place requests for data and applications to the server, which then carries out these requests.
The Internet revolves around the client-server architecture. Your computer runs software called the client and it interacts with another software known as the server located at a remote computer. The client is usually a browser such as Internet Explorer, Netscape Navigator or Mozilla. Browsers interact with the server through protocols. These protocols help in the accurate transfer of data through requests from a browser and responses from the server.                       


Q. 191561 What is star topology? How does it work? What is the main disadvantage of it?
A. is used to create web pages.
B. is used by the browser to talk with a web server.
C. breaks a message into fixed sized packets.
D. marks the addresses on the packets.

Right Answer is:

SOLUTION

Star topology is also known as star network. It is one of the most common network setups where each of the devices and computers on a network connects to a central hub. It needs more cable to be networked than the usual bus topology. It is used in homes and offices.  A major disadvantage of this type of network topology is that if the central hub fails, all computers connected to that hub would be disconnected.


Q. 191562 What are the advantages of network? Explain in detail.
A. is used to create web pages.
B. is used by the browser to talk with a web server.
C. breaks a message into fixed sized packets.
D. marks the addresses on the packets.

Right Answer is:

SOLUTION

Speed: Sharing and transferring files within networks are very rapid. Thus, it saves time while maintaining the integrity of the file.

Cost: Individually licensed copies of many popular software programs can be costly. Networkable versions are available at considerable savings. Shared programs on a network allow for easier upgrading of the program on one single file server instead of upgrading individual workstations.

Security: Sensitive files and programs on a network are password protected (established for specific directories to restrict access to authorized users) or designated as “copy inhibit”, so that you do not have to worry about illegal copying of programs.

Centralized Software Management: Software can be loaded on one computer (the file server) eliminating the need to spend time and energy installing updates and tracking files on independent computers throughout the building.

Resource Sharing: Resources such as printers, fax machines and modems can be shared.

Electronic mail: E-mail aids in personal and professional communication. Electronic mail on a LAN can enable staff to communicate within the building, having not to leave their desk.

Flexible Access: Access their files from computers throughout the firm

Workgroup Computing: Workgroup software(such as Microsoft BackOffice) allows many users to work on a document or project concurrently.


Q. 191563 Differentiate between star topology and mesh topology?
A. is used to create web pages.
B. is used by the browser to talk with a web server.
C. breaks a message into fixed sized packets.
D. marks the addresses on the packets.

Right Answer is:

SOLUTION

Star Topology

 

In the computer networking world, the most commonly used topology in LAN is the star topology. Star topologies can be implemented in homes, offices or even in a building. All the computers in the star topologies are connected to central devices like hub, switch or router. The functionality of all these devices is different. Computers in a network are usually connected with the hub, switch or router with the Unshielded Twisted Pair (UTP) or Shielded Twisted Pair Cables.

Mesh Topology

Mesh topology works on the concept of routes. In Mesh topology, message sent to the destination can take any possible shortest, easiest route to reach its destination. In the previous topologies star and bus, messages are usually broadcast  to every computer, especially in bus topology. Similarly, in the Ring topology,  message can travel in only one direction, i.e., clockwise or anticlockwise. Internet employs the Mesh topology and the message finds its route for its destination. Router works to find the routes for the messages and making them reach their destination. The topology in which every device connects to every other device is called a full Mesh topology unlike in the partial mesh in which every device is indirectly connected to the other devices.


Q. 191564 Explain the following terms:

a) LAN
b) MAN
c) WAN
A. is used to create web pages.
B. is used by the browser to talk with a web server.
C. breaks a message into fixed sized packets.
D. marks the addresses on the packets.

Right Answer is:

SOLUTION

   a) LAN (Local Area Network):  A group of computers that shares a common connection and is usually in a small area or even in the same building. For example, it can be an office or a home network. It is usually connected by Ethernet cables and has high speed connections. If it was a wireless setup, it would be called a WLAN, which would have a lower connection speed.

  b) MAN (Metropolitan Area Network):  This is a larger network that connects  computer users in a  particular geographic area or region. For example, a large university may have a network so large that it may be classified as a MAN. The MAN network usually exists to provide connectivity  to local ISPs, cable TV, or large corporations. It is far larger than a LAN and smaller than a WAN.  Also, large cities like London and Sydney, Australia, have metropolitan area networks.

c) 
 
WAN:  (Wide Area Network) This is the largest network and can inter-connect networks throughout the world because it is not restricted to a geographical location. The Internet is an  example of a worldwide public WAN. Most WANs exist to connect LANs that are not in the same geographical area. This technology is high speed and very expensive to setup.


Q. 191565 Explain the difference between analog signal and digital signal?
A. is used to create web pages.
B. is used by the browser to talk with a web server.
C. breaks a message into fixed sized packets.
D. marks the addresses on the packets.

Right Answer is:

SOLUTION

Analog: Analog signals are continuous electrical signals that vary in time. In other words, an Analog or analogue signal is any continuous signal for which the time varying feature (variable) of the signal is a representation of some other time varying quantity, i.e., analogous to another time varying signal. It differs from a digital signal in terms of small fluctuations in the signal which are meaningful.

Digital: A digital system is a data technology that uses discrete (discontinuous) values. By contrast, non-digital (or analog) systems use a continuous range of values to represent information. Although digital representations are discrete, the information represented can be either discrete, such as numbers, letters or icons, or continuous, such as sounds, images and other measurements of continuous systems.


Q. 191566 List the differences between FDDI and Token Ring.
A. is used to create web pages.
B. is used by the browser to talk with a web server.
C. breaks a message into fixed sized packets.
D. marks the addresses on the packets.

Right Answer is:

SOLUTION

·   As opposed to Token Ring's single ring, FDDI uses two rings to achieve better results and less chance of failure.

·    In a basic Token Ring network, at any instant, there is a single active ring monitor which supplies the master clock for the ring, whereas in FDDI, this approach is not ideal because of the high data rates. Instead, each ring interface has its own local clock and outgoing data is transmitted using this clock.

·  Unlike the basic Token Ring which is based on the use of priority and reservation bits, the priority operation of the FDDI ring uses a principle that is based on a parameter known as the Token Rotation Time or TRT.

          ·    FDDI uses a timed token protocol where Token Ring uses 
             priority /reservation token access, leading to differences in frame
             format and how station traffic is handled.


Q. 191567 What is the difference between switch and hub?
A. is used to create web pages.
B. is used by the browser to talk with a web server.
C. breaks a message into fixed sized packets.
D. marks the addresses on the packets.

Right Answer is:

SOLUTION

Although hubs and switches both link the PCs in a network, a switch is more expensive and a network built with switches is generally considered faster than one built with hubs.

When a hub receives a packet of data at one of its ports from a PC on the network, it transmits the packet to all of its ports and, thus, to all of the other PCs on the network. If two or more PCs on the network try to send packets at the same time a collision is said to occur. When that happens all the PCs have to go though a process described in CSMA/CD to resolve the conflict. Each Ethernet Adapter has both a receiver and a transmitter. Because they have to operate at half duplex (data flows one way at a time) and a hub retransmits data from one PC to all of the PCs, the maximum bandwidth is 100 Mhz and that bandwidth is shared by all the PC's connected to the hub. The result is, when a person downloads a large file from another computer, the network becomes congested. 

Two computers can be connected directly together in an Ethernet with a crossover cable.  A crossover cable doesn't have a collision problem. It hardwires the Ethernet transmitter on one computer to the receiver on the other. Data can be sent  in both directions simultaneously. The maximum available bandwidth is 200 Mbps, 100 Mbps each way, and there are no other PC's with which the bandwidth must be shared.

An Ethernet switch automatically divides the network into multiple segments, acts as a high-speed, selective bridge between the segments, and supports simultaneous connections of multiple pairs of computers. When the switch receives a packet, it reads the destination address in the packet, establishes a temporary connection between the source and destination ports, sends the packet on its way, and then terminates the connection.

High-speed electronics in the switch automatically connect the ports from a sending computer to the receiving computer on a per packet basis. Multiple connections like this can occur simultaneously.                         


Q. 191568 Describe TCP/IP.
A. is used to create web pages.
B. is used by the browser to talk with a web server.
C. breaks a message into fixed sized packets.
D. marks the addresses on the packets.

Right Answer is:

SOLUTION

The Transmission Control Protocol (TCP) is one of the core protocols of the Internet Protocol suite, often simply referred to as TCP/IP. Using TCP, applications on different networked hosts can create connections to one another, over which they can exchange streams of data. The protocol guarantees reliable and in-order delivery of data from sender to receiver. TCP provides connections that need to be established before sending data. TCP connections have three phases:
1. connection establishment 
2. data transfer 
3. connection termination

At the receiver’s end, the TCP arranges the received packets in proper sequence and discards duplicate packets while at the senders end, TCP makes sure any lost or damaged packets are resent, so that the message is properly communicated.

The Internet Protocol (IP) is a data-oriented protocol used for communicating data across a packet-switched internet work.
IP (Internet Protocol )  is a connectionless protocol. This means that IP does not establish a handshake with connected hosts in order to start generating data.   The functions of IP can be simply put as:

- Handling address mapping for the transmitting and receiving hosts.
- Creating the most basic unit of transmission, a datagram. A datagram has a particular format and size.             


Q. 191569 Which topology allows only one device to transmit at a time? Explain in detail with its advantages and disadvantages.
A. is used to create web pages.
B. is used by the browser to talk with a web server.
C. breaks a message into fixed sized packets.
D. marks the addresses on the packets.

Right Answer is:

SOLUTION

Bus topology connects each computer (node) to a single segment trunk (a communication line, typically coaxial cable, that is referred to as the 'bus'). The signal travels from one end of the bus to the other. A terminator is required at each to absorb the signal so that it does not reflect back across the bus. A media access method called CSMA/MA is used to handle the collision that occurs when two signals are placed on the wire at the same time. The bus topology is passive. In other words, the computers on the bus simply 'listen' for a signal; they are not responsible for moving the signal along.

Advantages:       

·   Failure of one of the stations does not affect others.

·    Good compromise over the other two topologies as it allows  relatively high rate of data transmission

·    Well suited for temporary networks that must be set up in a hurry

·    Easy to implement and extend

 

Disadvantages:     

·   Require a network to detect when two nodes are transmitting at the same time

·  Does not cope well with heavy traffic rates

·   Difficult to administer/troubleshoot

·   Limited cable length and number of stations

·    A cable brake can disable the entire network; no redundancy

·    Maintenance cost may be higher in the long run

·    Performance degrades as additional computers are added.


Q. 191570 Explain the term ‘network topology’. Name the four basic topologies. Explain any two topologies in brief.
A. is used to create web pages.
B. is used by the browser to talk with a web server.
C. breaks a message into fixed sized packets.
D. marks the addresses on the packets.

Right Answer is:

SOLUTION

Network topology is defined as the physical inter-connection of various elements (links, nodes, etc.) of a computer network. Network Topologies can be physical or logical. Physical Topology means the physical design of a network including the devices, location and cable installation. Logical topology refers to the fact as to how data actually transfers in a network as opposed to its design.

The network topology recognises four basic topologies:

Bus topology:

A bus topology is a method of transmission on networks that uses a common vehicle for transmissions and is, therefore, categorized as shared communication. Imagine a bus picking up various people from one stop and dropping of people as it travels and picks up a few more. That is what happens in a bus network exactly.

However, in a Bus topology, only one device is allowed to transmit at a given point of time. The DAP or the Distribute Access Protocol has the information about which station has to transmit the data. The data that is being transmitted has frames that will have the source name and the network address. 

Ring topology:

In local area networks where the ring topology is used, each computer is connected to the network in a closed loop or ring. Each machine or computer has a unique address that is used for identification purposes. The signal passes through each machine or computer connected to the ring in one direction. Ring topologies typically utilize a token passing scheme, used to control access to the network. By utilizing this scheme, only one machine can transmit on the network at a time. The machines or computers connected to the ring act as signal boosters or repeaters which strengthen the signals that transverse the network. The primary disadvantage of ring topology is that failure of one machine will cause the entire network to fail.


Q. 191571 Where is ring topology primarily used?Explain them.
A. is used to create web pages.
B. is used by the browser to talk with a web server.
C. breaks a message into fixed sized packets.
D. marks the addresses on the packets.

Right Answer is:

SOLUTION

Ring topology is used mainly in two kinds of networks:

a)    Token Ring Networks

b)    Fiber Distributed Data Interface

 

Token Ring Networks:

Unlike Ethernet, Token Ring uses a ring topology whereby the data is sent from one machine to the next and so on around the ring until it ends up back where it started. It also uses a token passing protocol which means that a machine can only use the network when it has control of the Token. This ensures that there are no collisions because only one machine can use the network at any given time. 

Fiber Distributed Data Interface :

The Fiber Distributed Data Interface or FDDI is a 100 mbps line using the LAN network and is connected through a fiber optic cable. The FDDI technology is used where the networks need a high speed bandwidth and need to cover huge distances than the copper wires usually cover. There are two kinds of networks in this category -- one is the fiber optic wire based and the other is the copper wire based called the Copper distributed data interface.

The inside architecture of the FDDI is based on the dual rings where the data is flowing in the opposite directions. There are two levels of rings -- the primary and the secondary. Most of the data transmission takes place using the primary ring and the secondary is idling. However, in case the primary does not work, the secondary takes over the primary’s functionalities.


Q. 191572 Explain point-to-point communication in detail with examples.
A. is used to create web pages.
B. is used by the browser to talk with a web server.
C. breaks a message into fixed sized packets.
D. marks the addresses on the packets.

Right Answer is:

SOLUTION

A point-to-point connection is a dedicated communication link between two systems or processes. Think of a wire that directly connects two systems. The systems use that wire exclusively to communicate. The opposite of point-to-point communications is broadcasting, where one system transmits to many.

A telephone call is a circuit-oriented, point-to-point link between two phones. However, calls are usually multiplexed across telephone company trunks; so, while the circuit itself may be virtual, the users are engaging in a point-to-point communication session.

An end-to-end connection refers to a connection between two systems across a switched network. For example, the Internet is made up of a mesh of routers. Packets follow a hop-by-hop path from one router to the next to reach their destinations. Each hop consists of a physical point-to-point link between routers. Therefore, a routed path consists of multiple point-to-point links. In the ATM and frame relay environment, the end-to-end path is called a virtual circuit that crosses a pre-defined set of point-to-point links.


Q. 191573 Computers gather data, which means that they allow users to


A. present data.

B. input data.

C. output data.

D. store data.

Right Answer is: B

SOLUTION

The users feed the data into the system through input devices. For example-keyboard, mouse, joystick, etc.


Q. 191574 The advantage of bus topology is


A. its short cable length.

B. its centralization.

C. its fault diagnosis.

D. the use of hub.

Right Answer is: A

SOLUTION

Bus topology has a short cable length because there is a single common path connecting all the nodes.


Q. 191575 Network topology that connects components along a single cable or a series of cables is known as


A. star.

B. bus.

C. ring.

D. circle.

Right Answer is: B

SOLUTION

A bus network topology is a network architecture in which a set of clients is connected via a shared communication line called a bus.


Q. 191576 What is InterSpace?
A. star.
B. bus.
C. ring.
D. circle.

Right Answer is:

SOLUTION

InterSpace is an indicator of what the Internet of the future will be like. It has a client/server architecture and hosts multiple users, by incorporating real-time audio and video communication that allows people to interact within a three-dimensional environment. 
InterSpace can be used for distance learning, on-line shopping, gaming, and interactive "Cyber-Events". It provides a great way to meet and talk to people from all over the world.


Q. 191577 What are protocols?  Give examples.
A. star.
B. bus.
C. ring.
D. circle.

Right Answer is:

SOLUTION

When computers communicate with each other, there needs to be a common set of rules and instructions that each computer follows. A specific set of communication rules is called a protocol. Because of the many ways computers can communicate with each other, there are many different protocols, like, PPP, TCP/IP, SLIP, HTTP, and FTP.


·  Transmission Control Protocol (TCP), which uses a set of rules to send and receive information packets  with other Internet points.
·  Internet Protocol (IP), which uses a set of rules to address each message so it reaches the correct destination.
·  Hypertext Transfer Protocol (HTTP) which uses a set of rules to allow communication between a browser and server.
·  File Transfer Protocol (FTP), which uses a set of rules to allow transfer of files (uploading and downloading) between the user’s computer and server.     


Q. 191578 Write a note on WLL?
A. star.
B. bus.
C. ring.
D. circle.

Right Answer is:

SOLUTION

WLL (Wireless local loop) provides wireless communication from fixed locations such as, homes or offices. The quality of service is very good and it supports fax and modem communication, internet and can connect to a Public Call Office. Here, there is a wireless link as the "last mile/first mile" to connect to the telephone service or to broadband internet. The signal transmissions occur through the air over a terrestrial microwave platform instead of through copper or fiber cables.  
Base stations are set up with multi-channel transmitters and receivers and customers are provided an interface unit into which the telephone is connected. When a call is made, a signal is sent to the base station, and a connection is made to allow communication. For an incoming call, the base station makes a wireless connection and gets the call through.

 The advantages of WLL  include the ability to connect with users, even in remote areas without the need for laying new cables and the capacity for broad bandwidth that is not impeded by fiber or cable capacities.          

 


Q. 191579 How is e-mail different from chatting?
A. star.
B. bus.
C. ring.
D. circle.

Right Answer is:

SOLUTION

Email or electronic mail is a way of sending electronic messages using the computer and over a network. The recipient does not have to be online for the email to reach successfully. He/she can read the mail when he is online.  
Chatting is textual conversation between 2 or more people who are simultaneously online. This communication goes on in real time.                


Q. 191580 What is cybercrime? Cyberlaw?
A. star.
B. bus.
C. ring.
D. circle.

Right Answer is:

SOLUTION

Cybercrime is criminal activity done using computers and the Internet. This includes anything from illegally downloading music files to stealing sensitive data.
Cyber law (or Cyberlaw) describes the legal issues related to use of information technology. Some topics it covers include intellectual property, privacy, freedom of expression, and jurisdiction.                      


Q. 191581 Give 2 advantages and 2 disadvantages of wireless communication?
A. star.
B. bus.
C. ring.
D. circle.

Right Answer is:

SOLUTION

Wireless communication does not use a medium, like cables, for transmission. There are advantages and disadvantages of this mode.
Advantages – 1.  Can be used where cable or wires cannot be laid – over mountains, sea etc.

2.  Allows mobility, communication can generally be from anywhere, anytime

Disadvantages – 1.  It is not secure as anyone with the right receiver can catch the signals

2.  Sensitive to atmospheric conditions, like rain, storm etc.           


Q. 191582 What is 80 – 20 rule of Network designing?
A. star.
B. bus.
C. ring.
D. circle.

Right Answer is:

SOLUTION

In a properly designed small to medium-sized network, 80 percent of the traffic on a given segment should be local, and not more than 20 percent should need to move across a backbone link.


Q. 191583 What are the goals of Networking?
A. star.
B. bus.
C. ring.
D. circle.

Right Answer is:

SOLUTION

The main goals of networking have always been to share resources and to provide a medium for communications.
Sharing Resources – among these are included not only printers and fax machines, but other devices like modems and servers. Software and data on the server maybe accessed and shared by different users.

Reducing Cost – It saves money to have a powerful server to store common files rather than have separate computers, each with its own set of files. Sharing other resources too saves on cost.

Reliability - If a machine goes down, another can take over. Copies of important files can be maintained easily.

Speed - Fast communication of data and messages.                                 

                                                        


Q. 191584 What are the basic elements of a communication system?
A. star.
B. bus.
C. ring.
D. circle.

Right Answer is:

SOLUTION

The following are the basic requirements for working of a communication system:
1. The sender (source) who creates the message to be transmitted
2. A medium that carries the message
3. The receiver (sink) who receives the message


Q. 191585 What is the difference between broadcast and point-to-point?
A. star.
B. bus.
C. ring.
D. circle.

Right Answer is:

SOLUTION

Broadcast means we are sending digital signals to any device connected to a network.

Point-to-point means that we are sending digital signals from a specific point to a specific point (identified by IP address or MAC address).


Q. 191586 List the similarities between FDDI and Token Ring.
A. star.
B. bus.
C. ring.
D. circle.

Right Answer is:

SOLUTION

·     FDDI uses a rotating ring setup in the same way as does the token ring protocol.
·      FDDI's ring operation is basically very similar to the Token Ring early release operation in the way that tokens are passed on the network.


Q. 191587 List the 4 disadvantages of network?
A. star.
B. bus.
C. ring.
D. circle.

Right Answer is:

SOLUTION

·        Server faults stop applications from being available.

·        Network faults can cause loss of data.

·        Network fault could lead to loss of resources.

·        User work dependent upon network.     

 


Q. 191588 Explain the characteristics of FDDI in brief?
A. star.
B. bus.
C. ring.
D. circle.

Right Answer is:

SOLUTION

FDDI stands for Fiber Distributed Data Interface. The FDDI topology is ring with two counter-rotating rings for reliability and with no hubs. Cable type is fiber-optic. Connectors are specialized. The media access method is token passing. Multiple tokens may be used by the system. The maximum length is 100 kilometers. The maximum number of nodes on the network is 500. Speed is 100 Mbps. FDDI is normally used as a backbone to link other networks. A typical FDDI network can include servers, connectors and links to other network.


Q. 191589 Compare star topology to bus topology?
A. star.
B. bus.
C. ring.
D. circle.

Right Answer is:

SOLUTION

As compared to the bus topology, a star network requires more devices and cables to complete a network. The failure of each node or cable in a star network won’t take down the entire network as happens in the Bus topology.

However, if the central connecting devices such as hub, switch or router fail due to any reason, ultimately the entire network can come down or collapse.


Q. 191590 Define the following terms with respect to data communication
a) Data b) Signals c) Signaling d) Transmission
A. star.
B. bus.
C. ring.
D. circle.

Right Answer is:

SOLUTION

a) Data: A collection of facts in raw form that becomes information after

    processing.

b) Signals: Electric or electromagnetic encoding of data.

c) Signaling: Propagation of signals across a communication medium.

d)Transmission: Communication of data achieved by the processing of signals.


Q. 191591 What is the difference between GSM and CDMA?
A. star.
B. bus.
C. ring.
D. circle.

Right Answer is:

SOLUTION

GSM and CDMA are differing technologies used for wireless communication. One of the basic things that differentiates GSM and CDMA is the way they handle bandwidth and divide up the signals between multiple users.

GSM
 (Global System for Mobile communication) uses a Time Division method. This means that each device on the local network is allocated a time slice where it "owns" the bandwidth, and it can send/receive its data. If there are 8 available time slices in a given cycle, each phone would then get 1/8th of every cycle in which it could send and receive signals. Each user’s data is digitized and compressed and sent in his own time slot. Data is encrypted for security. The SIM (Subscriber Identity Module) is an important component of the GSM cellular device and contains connection data, memory for data and applications, and a processor.

CDMA
(Code Division Multiple Access) is technology that was first used during World War II. CDMA works on the principle of Spread spectrum.The data is sent in small pieces over a number of frequencies available for use. Each user’s data is encrypted in a particular way and at the receiving end, decrypting is done to recover the actual signal.               


Q. 191592 What is the difference between worm and virus?
A. star.
B. bus.
C. ring.
D. circle.

Right Answer is:

SOLUTION

Viruses and worms are malicious programs that can cause damage to the computer, but there are differences between them.


A computer virus attaches itself to a file enabling it to spread from one computer to another, leaving infections as it travels.

Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect unless you run or open the malicious program. Remember,  a virus cannot be spread without a human action, such as running an infected program. 


A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which allows it to travel.

The worm has the capability to replicate itself on your system, so your computer can send out hundreds of copies of the worms instead of a single worm, creating a devastating effect. For example, a worm can send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and this continues. 

A worm consumes too much system memory causing Web servers, network servers and individual computers to stop responding.                         


Q. 191593 What is the difference between Internet and WWW?
A. star.
B. bus.
C. ring.
D. circle.

Right Answer is:

SOLUTION

Often, people use the terms Internet and World Wide Web interchangeably, but they are two separate but related things. 

The Internet is a massive network of networks, a networking infrastructure. It forms a network in which any computer can communicate with any other computer as long as they are both connected to the Internet. Information that travels over the Internet does so via a variety of ‘ protocols’.

The World Wide Web, or simply Web, is a way of accessing information over the medium of the Internet. It is an information-sharing model that is built on top of the Internet. The Web uses the HTTP protocol to transmit data. The Web also utilizes browsers, such as Internet Explorer or Firefox, to access Web documents called Web pages that are linked to each other via hyperlinks. Web documents also contain graphics, sounds, text and video.

The Web is just one of the ways that information can be distributed over the Internet. The Internet, not the Web, is also used for e-mail, Usenet news groups, instant messaging and FTP. So the Web is just a portion of the Internet, though a large one.                                             


Q. 191594 The study of molecules and structures whose size ranges from 1 to 100 nanometers, is known as


A. nanoscience.

B. microelectrodes.

C. computer forensics.

D. artificial intelligence.

Right Answer is: A

SOLUTION

Nanoscience and nanotechnology involves studying and working with matter on an ultra-small scale. One nanometre is one-millionth of a millimetre and a single human hair is around 80,000 nanometres in width.


Q. 191595 The memory location address are limited from


A. 00000 to 9ffff(16).

B. 00001 to 9ffff(16).

C. 00010 to 9ffff(16).

D. 10000 to 9ffff(16).

Right Answer is: A

SOLUTION

In computer science, a memory address is an identifier for a memory location, at which a computer program or a hardware device can store data and later retrieve it. The memory location address is limited from 00000 to 9ffff(16).


Q. 191596 The largest manufacturer of hard disk drives is


A. IBM.

B. Seagate.

C. Microsoft.

D. Magnetic Optical Disk.

Right Answer is: B

SOLUTION

A hard disk drive is a non-volatile storage device that stores digitally encoded data. Seagate technology is the largest manufacturer of Hard Disk Drives.


Q. 191597 The storage device that can store maximum amount of data is a


A. floppy disk.

B. hard disk.

C. compact disk.

D. magnetic optic disk.

Right Answer is: B

SOLUTION

A hard disk drive is a non-volatile storage device which stores digitally encoded data on rapidly rotating platters with magnetic surfaces. It stores the maximum amount of data.


Q. 191598 The technology that is used in a compact disks is


A. mechanical.

B. electrical.

C. electro magnetic.

D. laser.

Right Answer is: D

SOLUTION

A laser is a device that emits light (electromagnetic radiation) through a process called stimulated emission. The term laser is an acronym for Light Amplification by Stimulated Emission of Radiation. This technology is used in compact disks.


Q. 191599 The device in which we can add information to it but cannot erase or modify it is known as


A. floppy disk.

B. hard disk.

C. tape drive.

D. CDROM.

Right Answer is: D

SOLUTION

CD-ROM is a pre-pressed compact disc that contains data accessible to, but not writable by a computer.


Q. 191600 The number system that is usually followed in a typical 32-bit computer, is


A. 2.

B. 10.

C. 16.

D. 32.

Right Answer is: A

SOLUTION

The binary numeral system, or base-2 number system represents numeric values using two symbols; usually 0 and 1.This number system is followed in 32-bit computer.


PreviousNext