What does the port number in a TCP connection specify?


Options: It specifies the communication process on the two end systems B. It specifies the quality of the data & connection C. It specify the size of data D. All of the above

Ans:– A ,


Description: mcqquestions

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 5598 | Level: Moderate


******************************************************

Want to see where do you stand among other aspirants in "Computer" category?

Click Here to take quick 10 mins MCQ test to find out.




Got some suggestion about this question or to make this site better? Please leave your comments below.




More Computer Networks Related questions:


. How do you magnify your document?
Options: a. View, Zoom b. Format, Font c. Tools, Options d. Tools, Customize

Ans: –  A , –  A


What command is used with vi editor to move forward to the end of a word?
Options: c,    d,    b,    e

Ans:D ,D


Ethernet uses
Options: Bus topology,    Ring topology,    Star topology,    Tree topology

Ans:A ,A


To prevent the computer from overheating you should?
Options: Remove the slot cover from the back,    Keep the computer cover closed,    Remove the CPU fan,    All of the above

Ans:B ,B


. A floppy disk contains

Options: A) Circular tracks only B) Sectors only C) Both circular tracks and sectors D) None of the above

Ans:C,C


. A 32 bit microprocessor has the word length equal to
Options: A) 2 byte B) 32 byte C) 4 byte D) 8 byte

Ans:C,C


Which of the following statements correctly assigns 12 to month using pointer variable pdt? #include<stdio.h> struct date { int day; int month; int year; }; int main() { struct date d; struct date *pdt; pdt = &d; return 0; }
Options: pdt.month = 12,    &pdt.month = 12,    d.month = 12,    pdt->month = 12

Ans:D ,D


. What is the shortcut key to insert current date in a cell?
Options: a. CTRL + D b. CTRL + T c. CTRL + ; d. CTRL + /

Ans:– c,– c


Which of the following is an advantage of using an expert system development tool?
Options: imposed structure,    knowledge engineering assistance,    rapid prototyping,    All of the above

Ans:D ,D


Information in a memory that is no longer valid or wanted is known as
Options: non-volatile,    volatile,    surplus,    garbage

Ans:D ,D


Which values are held in CMOS for the hard drive
Options: size (heads, cylinders, sectors),    IRQ,    Free space,    Virus alert

Ans:A ,A


. Essential files of MS DOS are
Options: a. Command . com b. Io.sys c. Msdos.sys d. All of above

Ans:8 – d ,8 – d


Which of the following is not anti-viruses software?
Options: NAV B. F-Prot C. Oracle D. McAfee

Ans:– C ,


Which of the following modes are valid when a switch port is used as a VLAN trunk? Blocking Dynamic auto Dynamic desirable Nonegotiate Access Learning
Options: 1, 2 and 6,    2, 3 and 4,    4, 5 and 6,    2, 4, and 5

Ans:B ,B


. Which of the following options is NOT a part of an option group?
Options: a. Option button label b. Option group frame c. Option group label d. Option group button

Ans:– d,– d


. In a punched card system, data is processed by a

Options: A) Keypunch machine, sorter and posting machine B) Accounting machine, posting machine, and billing machine C) Sorter, posting machine, and billing machine D) Accounting machine, keypunch machine and sorter

Ans:D,D


The feedback loop in the general systems model is represented fey
Options: data flow,    decision flow,    information flow,    All of the above

Ans:D ,D


Which of the following function sets first n characters of a string to a given character?
Options: strinit(),    strnset(),    strset(),    strcset()

Ans:B ,B


A system design is said to be functionally modular if
Options: the system is able to handle all the function of the application,    each module performs a specific function and can be developed relatively independently by programmers,    the system makes extensive use of function. keys for maximum user assistance,    the system is developed using structured programming through COBOL or PASCAL

Ans:B ,B


When seeking to upgrade for a particular motherboard what do you need to know?
Options: memory,    hard drive,    make & model,    dimm

Ans:C ,C


The network address of 172.16.0.0/19 provides how many subnets and hosts?
Options: 7 subnets, 30 hosts each,    8 subnets, 8,190 hosts each,    8 subnets, 2,046 hosts each,    7 subnets, 2,046 hosts each

Ans:B ,B


A record management system
Options: a. can handle many files of information at a time b. can be used to extract information stored in a computer file c. always uses a list as its model d. both a and b 

Ans:.b,.b


Conversion method in which users, being used to an old system, continue to use the old system, alongside the new system, is
Options: multi processing,    multitasking,    parallel run,    All of the above

Ans:C ,C


The system unit of a personal computer typically contains all of the following except:
Options: microprocessor,    disk controller,    serial interface,    modem

Ans:D,D


Which of the following are likely to jam the read/write head of a disk pack?
Options: Dust,    Smoke particle,    Finger print smudge,    All of the above

Ans:D,D


With respect to personnel matters in the United States, OSHA stands for
Options: Overseas Housing Authority,    Occupational Safety and Health Act,    Office Standard Help Agreement,    Office Staff Help Administration

Ans:B ,B


A magnetic storage device on which data is stored on a cylindrical drum, subdivided into tracks is known as
Options: Punched card,    Magnetic disk,    Magnetic tape,    Drum

Ans:D ,D


. Another term for hyperlink is
Options: a. Link b. Source c. Bar d. None of above

Ans:9 – a ,9 – a


The total impedance of a series RLC circuit:
Options: is minimum at the resonant frequency,    always increases as the applied frequency increases,    always decreases as the applied frequency increases,    is maximum at the resonant frequency

Ans:A ,A


. A(n) _____ is an image control that displays in the background of a page on a form or report.
Options: a. legend b. icon c. logo d. watermark

Ans:9 – d ,9 – d


Why does the data communication industry use the layered OSI reference model? It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting. It enables equipment from different vendors to use the same electronic components, thus saving research and development funds. It supports the evolution of multiple competing standards and thus provides business opportunities for equipment manufacturers. It encourages industry standardization by defining what functions occur at each layer of the model.
Options: 1 only,    1 and 4,    2 and 3,    3 only

Ans:B ,B


What is the abbreviation used for a software package that permits the users to create, retrieve and maintain records in a database?
Options: DASD,    FMS,    EMMS,    DBMS

Ans:D ,D


The modify operation is likely to be done after
Options: Delete,    Look-up,    Insert,    All of the above

Ans:B ,B


The working principles of today's computers were provided by an English mathematician
Options: Charles Babbage,    Dr. Hollerith,    Donald Reach,    Ken Reider

Ans:A ,A


Environmental information is especially important to
Options: top-level managers,    middle-level managers,    low-level managers,    All of the above

Ans:A ,A


If you want your database to include methods, you should use a _____ database.
Options: Network,    Distributed,    Hierarchical,    Object-Oriented

Ans:D ,D


The command that can be used to restrict incoming messages to a user is
Options: mesg,    grep,    halt,    sleep

Ans:A ,A


You set the console password, but when you display the configuration, the password doesn't show up; it looks like this: [output cut] Line console 0 Exec-timeout 1 44 Password 7098C0BQR Login [output cut] What cause the password to be stored like this?
Options: encrypt password,    service password-encryption,    service-password-encryption,    exec-timeout 1 35

Ans:B ,B


The value of a capacitor can be made larger by:
Options: increasing the area of the plates,    decreasing the area of the plates,    increasing the frequency of the applied voltage,    increasing the voltage applied to the plates

Ans:A ,A


A BI reporting system does not ________ .
Options: create meaningful information,    deliver information to users on a timely basis,    use statistical procedures to predict future events,    use disparate data sources

Ans:C ,C


Where can you find the horizontal split bar on MS Word screen?
Options:  A) On the left of horizontal scroll bar, B) On the right of horizontal scroll bar, C) On the top of vertical scroll bar, D) On the bottom of vertical scroll bar, 

Ans:-C,-C


. Which is a semi conductor memory?
Options: A) Dynamic B) Static C) Bubble D) Both a & b

Ans:D,D


. Which of the following command is used to close the active window?
Options: a. Ctrl+F4 b. Ctrl+F5 c. Alt+F6 d. None of above

Ans:8 – a ,8 – a


The _____ is a business-oriented data-processing association which publishes a monthly journal, Data Management.
Options: DPMA,    CDP,    CISA,    ACM

Ans:A ,A


. Which of the following is called low level languages?

Options: A) Machine language B) Assembly language C) Both of the above D) None of above

Ans:C,C


Which of the following commands is used to count the total number of lines, words, and characters contained in a file.
Options: count p,    wc,    wcount,    countw

Ans:B ,B


How can you navigate around virtual consoles?
Options: Alt+Function Key,    Ctrl+Function Key,    Ctrl+Alt+Del,    Alt+a+w+Function Key

Ans:A ,A


What will be the output of the program if it is executed like below? cmd> sample /* sample.c */ #include<stdio.h> int main(int argc, char **argv) { printf("%s\n", argv[argc-1]); return 0; }
Options: 0,    sample,    samp,    No output

Ans:B ,B


Error detecting code is
Options: an error-detecting code based on a summation operation performed on the bits to be checked,    a check bit appended to an array of binary digits to make the sum of all the binary digits.,    a code in which each expression conforms to specify rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the error is detected.,    the ratio of the data units in error to the total number of data units

Ans:C ,C


What command is used to display the characteristics of a process?
Options: au,    ps,    du,    pid

Ans:B ,B

www.000webhost.com