Layer-2 Switch is also called


Options: Multiport Hub B. Multiport Switch C. Multiport Bridge D. Multiport NIC

Ans:– C ,






More Computer Networks Related questions:


. “Ctrl + Delete” is used to
Options: Delete the word just after the cursor B. Delete the word just before the cursor         C. Delete the single letter just after the cursor D. Delete the single letter just before the cursor

Ans:– A ,


. Which is not a system tool?
Options: a. Folder b. Backup c. Scandisk d. Format

Ans:3 – a ,3 – a


A high speed device used in CPU for temporary storage during processing is called
Options: A register,    A bus,    A databus,    All of the above

Ans:A,A


You can group noncontiguous worksheets with
Options: The alt+enter key B. The ctrl key and mouse C. The shift key and the mouse D. The group button on the standard toolbar

Ans: – B ,


A compiler for a high-level language that runs on one machine and produces code for a different machine is called is
Options: optimizing compiler,    one pass compiler,    cross compiler,    multipass compiler

Ans:C ,C


. In a table to insert User’s Voice, Data field should be
Options: a. OLE Object b. SoundField c. VoiceField d. Memo

Ans:– a,– a


In MODEMS
Options: Several digital signals are multiplexed,    A digital signal changes some characteristic of a carrier wave,    Digital signal is amplified,    All of the above

Ans:B ,B


The first computer made available for commercial use was
Options: Mark-I,    ENIAC,    EDSAC,    UNIVAC

Ans:D ,D


What do you mean by one to many relationship between Student and Class table?
Options: a. One student can have many classes b. One class may have many student c. Many classes may have many students d. Many students may have many classes

Ans:ndash; a,ndash; a


Give me an example of a cell address.
Options: 11 25 B. 911 C. 41A D. A21

Ans:– D ,


You are working with a network that is 172.16.0.0 and would like to have the maximum number of hosts per subnet. This assumes support for eight subnets. What subnet mask should you use?
Options: 255.255.192.0,    255.255.224.0,    255.255.240.0,    255.255.248.0

Ans:C ,C


Which of the following is a voiceband channel?
Options: Telephone line,    Telegraph line,    Coaxial cable,    Microwave systems

Ans:A ,A


Compared to an open-loop system, a closed-loop control system is:
Options: more accurate,    more complex,    more stable,    All of the above

Ans:D ,D


What will be the output of the program? #include<stdio.h> typedef struct error {int warning, err, exception;} ERROR; int main() { ERROR e; e.err=1; printf("%d\n", e.err); return 0; }
Options: 0,    1,    2,    Error

Ans:B ,B


Data collection terminals are used to report the activity of
Options: material flow,    machine use,    manpower use,    All of the above

Ans:D ,D


What will be the output of the program? #include<stdio.h> int main() { char huge *near *ptr1; char huge *far *ptr2; char huge *huge *ptr3; printf("%d, %d, %d\n", sizeof(ptr1), sizeof(ptr2), sizeof(ptr3)); return 0; }
Options: 4, 4, 8,    2, 4, 4,    4, 4, 2,    2, 4, 8

Ans:B ,B


The robot:
Options: is very primitive at the present,    represents the most powerful new industrial automation tool currently on the horizon,    will be more useful when robot vision is improved significantly,    All of the above

Ans:D ,D


Which of the following can be output by a computer?
Options: graphics,    voice,    text,    computer-usable data or information

Ans:E ,E


. After entering all fields required for a table, if you realize that the third field is not needed, how will you remove?
Options: a. You need to delete the whole table. There is no method to remove a particular field only. b. Delete all the fields from third downwards and reenter the required fields again. c. Select the third column in datasheet view then delete d. Select the third row in table design view then delete

Ans:3 – d ,3 – d


How many broadcast domains are created when you segment a network with a 12-port switch?
Options: 1,    2,    5,    12

Ans:A ,A


A popular technique for forecasting is
Options: correlation analysis,    regression analysis,    linear programming,    Monte Carlo

Ans:B ,B


A distributed data processing configuration in which all activities must pass through a centrally located computer is called a:
Options: ring network,    spider network,    hierarchical network,    data control network

Ans:B ,B


What will be the output of the program given below in 16-bit platform ? #include<stdio.h> int main() { enum value{VAL1=0, VAL2, VAL3, VAL4, VAL5} var; printf("%d\n", sizeof(var)); return 0; }
Options: 1,    2,    4,    10

Ans:B ,B


A proposed network infrastructure of interconnected local, regional, and global networks that would support universal interactive multimedia communications. Select the best fit for answer:
Options: Internetworked enterprise,    Information super highway,    Business applications of telecommunications,    Client/Server networks

Ans:B ,B


The axis of movement of a robot may include:
Options: Wrist rotation,    X-Y coordinate motion,    elbow rotation,    All of the above

Ans:D ,D


What is the minimum number of wires needed to send data over a serial communication link layer?
Options: 1,    2,    4,    6

Ans:B ,B


. Most of the inexpensive personal computers do not have any disk or diskette drive. What is the name of such computes?

Options: A) Home computers B) Diskless computers C) Dedicated computers D) General purpose computers

Ans:B,B


Which of the following term is used in connection with the organisation of files in ALGOL 68
Options: Blow,    Machine,    Biquinary,    Book

Ans:D ,D


A microprocessor unit, a memory unit, and an input/output unit form a:
Options: CPU,    compiler,    microcomputer,    ALU

Ans:C ,C


. Any method for controlling access to or use of memory is known

Options: A) Memory map B) Memory protection C) Memory management D) Memory instruction

Ans:B,B


. Which of the following is an example of a real time operating system?
Options: a. Lynx b. MS DOS c. Windows XP d. Process Control

Ans: d, d


. All of the following are TRUE regarding virtual memory EXCEPT
Options: a. Any amount of RAM can be allocated to virtual memory b. The setting for the amount of hard disk drive space to allocate virtual memory canbe manually change c. This temporary storage is called the swap file or page file d. Virtual memory is the physical space o the hard drive

Ans: a, a


. Which company is the biggest player in the microprocessor industry?
Options: A) Motorola B) IBM C) Intel D) AMD

Ans:C,C


Which of the following is most responsible for the inability of auditors to uncover computer crimes?
Options: the auditor's lack of knowledge in computer technology,    the prohibitively expensive audit procedures needed to detect computer frauds,    the client's concern that the public will learn of the crime,    the relatively small average take of computer frauds

Ans:B ,B


. In which order do you place the field to sort a Dynaset first by zipcode, then by lastname and then by firstname?
Options: a. zipcode, firstname, lastname b. firstname, lastname, zipcode c. zipcode, lastname, firstname d. can’t sort by multiple fields

Ans:– c,– c


What is the usable size of Network bits in Class B of IP address?
Options: 04 B. 08 C. 14 D. 16

Ans:– C ,


Which of the following characteristics is not true of NetBEUI?
Options: Highly-customizable,    Routable,    Little configuration required,    Fast for small networks to Self-tuning

Ans:B ,B


Insert Date, Format Page Number, and Insert AutoText are buttons on the _____ toolbar.
Options: a. Formatting b. Header and Footer c. Standard d. Edit

Ans:– B,– B


A computer system consisting of its processor, memory and I/O devices accepts data, processes it and produces the output results. Can you tell in which component is the raw data fed?
Options: Mass Memory,    Main memory,    Logic unit,    Arithmetic unit

Ans:B ,B


How does a parallel port communicate information to a peripheral device?
Options: one bit at a time,    8 bytes at a time,    one byte at a time,    16,555 bytes at a time

Ans:C ,C


Corporate modeling languages often do provide for
Options: model definition,    DML commands,    editing,    report specification

Ans:A ,A


Which of the following is NOT a type of SQL constraint?
Options: PRIMARY KEY,    FOREIGN KEY,    ALTERNATE KEY,    UNIQUE

Ans:C ,C


. The expression builder is an access tool that controls an expression___ for entering an expression
Options: a. Table b. Box c. Cell d. Palette

Ans:6 – b ,6 – b


Which, of the following is not true about the description of a decision table?
Options: A decision table is easy to modify,    A decision table is directly understood by the computer,    A decision table is easy to understand,    All of the above

Ans:B ,B


An AI system developed by Daniel Bobrow to read and solve algebra word problems
Options: SHRDLU,    SIMD,    BACON,    STUDENT

Ans:D ,D


What will be the output of the program (sample.c) given below if it is executed from the command line? cmd> sample friday tuesday sunday /* sample.c */ #include<stdio.h> int main(int sizeofargv, char *argv[]) { while(sizeofargv) printf("%s", argv[--sizeofargv]); return 0; }
Options: sample friday tuesday sunday,    sample friday tuesday,    sunday tuesday friday sample,    sunday tuesday friday

Ans:C ,C


Which of the following does not affect the resolution of a video display image?
Options: bandwidth,    raster scan rate,    vertical and horizontal lines of resolution,    screen size

Ans:D ,D


. The ability of a database to grow as the data tracking needs grow is its __________.
Options: a. scalability b. expandability c. maintainability d. platform-independence

Ans:8 – a ,8 – a


. If you select Insert >> Picture >> From File
Options: a.  You can insert pictures and clipArts b.  You can insert clipArts only c.  You can insert pictures only d.  None of above

Ans:6 – C ,6 – C


In SQL, which command(s) is(are) used to enable/disable a database trigger?
Options: MODIFY USER,    CHANGE USER,    ALTER TRIGGER,    All of the above

Ans:C ,C

www.000webhost.com