What is the address size of IPv6 ?


Options: 32 bit B. 64 bit C. 128 bit D. 256 bit

Ans:– C ,


Description: mcqquestions

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 9678






More Computer Networks Related questions:


  To draw the Square box in the slide by selecting rectangle tool A.  Holding CTRL & Draw B.  Holding ALT & Draw C.  Holding SHIFT & Draw D.  All of the above
Options:

Ans:– C ,


79. Which would you choose to save a document with a new name?
Options: a. Press Ctrl+S b. Click File, Save c. Click Tools, Options, Save d. Click File, Save As

Ans:–  D ,–  D


Which of the following is(are) true of system analysts?
Options: their responsibility is to analyze and design system software,    they may be looked upon as an intermediary between users and programmers,    they are heavily involved with the system-development life cycle,    both (a) and (c)

Ans:D ,D


Microsoft Excel is a powerful………..
Options: Word processing package B. Spreadsheet package C. Communication S/W Package D. DBMS package

Ans:– B ,


Accessing records from a file directly without searching from the beginning of the file is
Options: Time sharing,    Random,    Direct access,    Access time

Ans:C,C


A worksheet can have a maximum of …. Number of rows
Options: a. 256 b. 1024 c. 32000 d. 65535

Ans:#8211; d,#8211; d


What Does EISA stand for?
Options: Extended Industry Standard Architecture,    Expanded Industry Standard Architecture,    Enhanced Industry Standard Architecture,    Electronics Industry Standard Architecture

Ans:A ,A


In slide layout panel how many layouts are available for text layout by default?
Options: a. 4 b. 7 c. 12 d. None of above

Ans: – A , – A


Which command is used to locate all the .profile files in the system?
Options: ls profile,    find /-name profile -print,    cd /.profile,    l -u .profile

Ans:B ,B


Assume integer is 2 bytes wide. How many bytes will be allocated for the following code? #include<stdio.h> #include<stdlib.h> #define MAXROW 3 #define MAXCOL 4 int main() { int (*p)[MAXCOL]; p = (int (*) [MAXCOL])malloc(MAXROW *sizeof(*p)); return 0; }
Options: 56 bytes,    128 bytes,    24 bytes,    12 bytes

Ans:C ,C


The user communicates directly with the computer through its peripheral devices is known as
Options: On-line processing,    Remote-terminal processing,    Batch mode processing,    Intelligent terminal Processing

Ans:A ,A


Branch mark programs are best characterized as
Options: Simulator programs,    Hallmarking,    Actual system programs,    Vendor software for applications

Ans:B ,B


A _____ purpose computer is designed for a specific application.
Options: special,    analog,    hybrid,    digital

Ans:A ,A


How much power (roughly) a light-emitting diode can couple into an optical fiber?
Options: 100 microwatts,    440 microwatts,    100 picowatts,    10 milliwatts

Ans:A ,A


Which of the following function key activates the speller?
Options:  A) F5, B) F7, C) F9, D) Shift + F7,

Ans:-B,-B


0 Who invented Integrated Circuit (IC)?
Options: Herman Hollerith B. Jack Kilby C. Semen Korsakov D. Bill Gates

Ans: – B ,


What is the purpose of the PSH flag in the TCP header?
Options: Typically used to indicate end of message B. Typically used to indicate beginning of message C. Typically used to push the message D. Typically used to indicate stop the message

Ans:– A ,


For every relationship, how many possible sets of minimum cardinalities are there?
Options: Two,    Three,    Four,    Six

Ans:C ,C


. Who invented EDSAC?
Options: A) John v. Neumann B) J.p. Eckert and John Mauchley C) Maurice Wilkes D) Howard Aiken

Ans:C,C


The rule(s) to follow in constructing decision tables is (are):
Options: a decision should be given a name,    the logic of the table is independent of the sequence in which conditions rules are written, but the action takes place in the order is which the events occur.,    standardized language must be used consistently.,    All of the above

Ans:D ,D


Which of the following is not a limitation of binary search algorithm?
Options: a. must use a sorted array b. requirement of sorted array is expensive when a lot of insertion and deletions are needed c. there must be a mechanism to access middle element directly d. binary search algorithm is not efficient when the data elements are more than 1000.

Ans:- d,- d


The emitter diode is usually
Options: Forward-biased,    Reverse-biased,    Nonconducting,    Operating in the breakdwon region

Ans:A ,A


What is the default subnet mask for a class C network?
Options: 127.0.0.1,    255.0.0.0,    255.255.0.0,    255.255.255.0

Ans:D ,D


A smart modem can dial, hang up and answer incoming calls automatically. Can you tell who provides the appropriate instruction to the modem for this purpose?
Options: Communications software,    Error detecting protocols,    Link access procedure (LAP),    Telecommunications

Ans:A ,A


88. To convert a hyperlink e-mail address to regular text, right-click the e-mail address and then click _____ on the shortcut menu.
Options: a. Edit Hyperlink b. Select Hyperlink c. Convert Hyperlink d. Remove Hyperlink

Ans:– D ,– D


If the values of a variable in one module is indirectly changed by another module, this situation is called
Options: A)internal change b.inter-module change c.side effect d.side-module update

Ans:C,Side effect


Demodulation is a process of
Options: converting analog to digital signals,    converting digital to analog signals,    multiplexing various signals into one high speed line signals,    performing data description.

Ans:A ,A


What is the standard code the computer industry created to represent characters?
Options: DASI,    ASSH,    ASCII,    BASCII

Ans:C ,C


Database Management Systems are featured with:
Options: a. The facility to easy editing, spelling check, auto pagination, lay out and printing reports b. The ability to store large amount of data to facilitate easy update, sort and retrieval c. The ability to calculate efficiently with the help of built-in functions and analyze d. All of above

Ans:ndash; b,ndash; b


What is the name of the reading device which mades use of photosensors and laser technologies to interpret printed, typed or even hand-written data directly from the source documents?
Options: MICR,    OCR,    Mark-sensing device,    ATM

Ans:B ,B


Which of the following is not an advantage of the data-base approach?
Options: elimination of the data redundancy,    ability to associate related data,    increased security,    program/data independence

Ans:E ,E


If special forms are needed for printing the output, the programmer specifies these forms through?
Options: JCL,    JPL,    Utility programs,    Load modules

Ans:A ,A


One approach to standardization storing of data?
Options: a. MIS b. structured programming c. CODASYL specification d. none of the above

Ans:.c,.c


. The Name box on to the left of formula bar
Options: a.  shows the name of workbook currently working on b.  shows the name of worksheet currently working on c.  shows the name of cell or range currently working on d.  None of above

Ans:– c,– c


What does the acronym ISDN stand for?
Options: Indian Standard Digital Network,    Integrated Services Digital Network,    Intelligent Services Digital Network,    Integrated Services Data Network

Ans:B ,B


What was the computer invented by Attanasoff and Clifford?
Options: A) Mark I B) ABC C) Z3 D) None of above

Ans:-B,-B


. What is the use of a master document in Word 2010?
Options: It organize and maintain a Fonts & Pictures by creating a master folder B. It organize and maintain a Heading and Styles by creating a master list C. It organize and maintain a Long document by dividing it into several subdocuments D. It organize and maintain a Styles and Links by creating a separate master document

Ans:– C ,


. Which mode loadsminimal set of drivers when starting Windows?
Options: a. Safe Mode b. Normal Mode c. VGA Mode d. Network Support Mode

Ans: a, a


To organize files on a disk, MS-DOS separates them into areas called _____
Options: directories,    buckets,    areas,    area directories

Ans:A ,A


. Which of the following Format supports for Data Type Yes/No?
Options: a. Yes/No b. True/False c. On/Off d. All of Above

Ans:– d,– d


. An online backing storage system capable of storing larger quantities of data is
Options: A) CPU B) Memory C) Mass storage D) Secondary storage

Ans:C,C


Indexed-Sequential organization
Options: means storing records in contiguous blocks according to a key.,    Stores records sequentially but uses an index to locate records,    uses an index for each key type,    has records placed randomly throughout the file

Ans:B ,B


Sensitivity Analysis is the ability to perform:
Options: What-if analysis,    If-so analysis,    What-then analysis,    And-or analysis

Ans:A ,A


. Which is the first program run on a computer when the computer boots up?
Options: a. System software b. Operating system c. System operations d. None

Ans: b, b


.  A report module includes code for all event _______ triggered by events occurring on a specific report or its controls.
Options: a.            properties b.           procedures c.           macros d.            commands

Ans:– b,– b


If you have a PowerPoint show you created and want to send using email to another teacher you can add the show to your email message as a (an)
Options: a. Inclusion b. Attachment c. Reply d. Forward

Ans: – B , – B


In SQL, which command is used to make permanent changes made by statements issue since the beginning of a transaction?
Options: ZIP,    PACK,    COMMIT,    SAVE

Ans:C ,C


You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with?
Options: access-list 10 deny 172.16.48.0 255.255.240.0,    access-list 10 deny 172.16.0.0 0.0.255.255,    access-list 10 deny 172.16.64.0 0.0.31.255,    access-list 10 deny 172.16.48.0 0.0.15.255

Ans:D ,D


HMP (Host Monitoring Protocol) is:
Options: a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address,    a TCP/IP high level protocol for transferring files from one machine to another.,    a protocol used to monitor computers,    a protocol that handles error and control messages

Ans:C ,C


An incremental backup
Options: should be done each month,    uses more tapes,    saves all files,    saves only files that have recently changed

Ans:D ,D

www.000webhost.com