What is the address size of IPv6 ?


Options: 32 bit B. 64 bit C. 128 bit D. 256 bit

Ans:– C ,






More Computer Networks Related questions:


The dielectric constant of a material is a measure of:
Options: the amount of voltage it can withstand before breaking down,    how well the material concentrates electrostatic lines of force,    the amount of opposition to the current flow,    how well the material concentrates magnetic lines of force

Ans:B ,B


A form defined 
Options: a. where data is placed on the screen b. the width of each field c. both a and b d. none of the above

Ans:.a,.a


The total capacitance of a series capacitor circuit is:
Options: equal to the sun of the individual capacitive-reactance values,    equal to the sum of the individual capacitance values,    equal to the source voltage divided by total current,    less than the value of the smallest capacitor

Ans:D ,D


The cat command is used to
Options: capture a file,    display a file,    print a file,    copy a file

Ans:B ,B


The wildcard in a WHERE clause is useful when?
Options: An exact match is necessary in a SELECT statement.,    An exact match is not possible in a SELECT statement.,    An exact match is necessary in a CREATE statement.,    An exact match is not possible in a CREATE statement.

Ans:B ,B


An enterprise data model is:
Options: a graphical model that shows the high-level entities for an organization.,    a graphical model that shows all entities for an organization.,    a non-graphical model that shows the high-level entities for an organization.,    a non-graphical model that shows the all entities for an organization.

Ans:A ,A


In 1830, Charles Babbage disigned a machine called the Analytical Engine which he showed at the Paris Exhibition. In which year was it exhibited?
Options: 1820,    1860,    1855,    1870

Ans:C ,C


The method of solid modeling that defines the topology of faces, edges, and vertics, as well as data that defines the surface in which each face lies is called:
Options: constructive solid geometry,    layering,    boundary representation,    isometric

Ans:C ,C


Resolution of externally defined symbols is performed by
Options: Linker,    Loader,    Compiler,    Assembler

Ans:A ,A


Which of the following storage and retrieval methods would be well suited to your processing requirements if you only need to retrieve records one at a time and there is no fixed pattern to the requests for data and records?
Options: indexed sectors,    sequential,    direct,    indexed direct

Ans:D ,D


Which of the following protocols uses both TCP and UDP?
Options: FTP,    SMTP,    Telnet,    DNS

Ans:D ,D


What will the function rewind() do?
Options: Reposition the file pointer to a character reverse.,    Reposition the file pointer stream to end of file.,    Reposition the file pointer to begining of that line.,    Reposition the file pointer to begining of file.

Ans:D ,D


. Which of the following is not electro-mechanical computer?
Options: A) Mark I B) ABC C) Zuse D) UNIVAC

Ans:7-D,7-D


The Operating system manages
Options: Memory,    Processor,    Disks and I/O devices,    All of the above

Ans:D ,D


What is the notation for following functions? 1. int f(int a, float b) { /* Some code */ } 2. int f(a, b) int a; float b; { /* Some code */ }
Options: 1. KR Notation 2. ANSI Notation,    1. Pre ANSI C Notation 2. KR Notation,    1. ANSI Notation 2. KR Notation,    1. ANSI Notation 2. Pre ANSI Notation

Ans:C ,C


A functional dependency is a relationship between or among:
Options: tables.,    rows.,    relations.,    attributes.

Ans:D ,D


Exceptions to the 8085 microprocessor normal operation are called:
Options: jump instructions,    decoding,    interrupts,    jump instructions or interrupts

Ans:D ,D


HOSTS file entries are limited to how many characters?
Options: 8,    255,    500,    Unlimited

Ans:B ,B


Point out the error in the program? #include<stdio.h> int main() { union a { int i; char ch[2]; }; union a z1 = {512}; union a z2 = {0, 2}; return 0; }
Options: Error: invalid union declaration,    Error: in Initializing z2,    No error,    None of above

Ans:B ,B


Client/server security includes which of the following?
Options: Physical security,    Change control security,    Measures taken to secure all systems,    All of the above.

Ans:D ,D


....... transforms one interface into other interface
Options: a. Program b. Software c. Data d. None

Ans:1 – b ,1 – b


. The Third Generation Computer was made with ________.
Options: A) Vacuum Tube B) Discrete Components C) IC D) Bio Chips

Ans:C,C


Which of the following is not a relational database?
Options: a . dBase IV b. 4th Dimension c. FoxPro d. Reflex

Ans:.d,.d


Contention is
Options: One or more conductors that serve as a common connection for a related group of devices,    a continuous frequency capable of being modulated or impressed with a second signal,    the condition when two or more stations attempt to use the same channel at the same time,    a collection of interconnected functional units that provides a data communications service among stations attached to the network

Ans:C ,C


Which of the following helps to reduce spelling error in the document?
Options: Auto Format B. Auto Correct C. Smart Tags D. Auto Text

Ans:– B ,


. The file system “NTFS” stands for
Options: a. New Type File System b. Never Terminated File System c. New Technology File System d. Non Terminated File System

Ans:0 – c ,0 – c


Which of the following commands will display the current IP addressing and the layer 1 and 2 status of an interface? show version show protocols show interfaces show controllers show ip interface
Options: 1, 2 and 4,    2, 3 and 5,    3 and 4 only,    None of the above

Ans:B ,B


Which of the following statements is true?
Options: Two SCSI devices connected to a computer can have the same ID if they are both hard drives.,    Each SCSI device must have its own ID,    All SCSI devices must have the same ID,    SCSI ID's are irrelevant

Ans:B ,B


Which is considered a direct entry input device?
Options: Optical scanner,    Mouse,    Light pen,    Digitizer

Ans:E ,E


Which JDBC driver Type(s) can you use in a three-tier architecture and if the Web server and the DBMS are running on the same machine?
Options: Type 1 only,    Type 2 only,    Both Type 3 and Type 4,    All of Type 1, Type 2, Type 3 and Type 4

Ans:D ,D


A key:
Options: must always be composed of two or more columns.,    can only be one column.,    identifies a row.,    identifies a column.

Ans:C ,C


special effects used to introduce slides in a presentation are called
Options: a. effects b. custom animations c. transitions d. present animations

Ans: – C , – C


Error detection at a data link level is achieved by
Options: bit stuffing,    cyclic redundancy codes,    Hamming codes,    equalization

Ans:B ,B


. Another word for a daisy wheel printer
Options: A) Petal printer B) Golf ball printer C) Laser printer D) Line printer

Ans:B,B


Absolute Zero temperature equals
Options: 0o C,    -273o C,    -276o C,    25o C

Ans:B ,B


A 'number crunching' computer is one that can handle
Options: large spreadsheets,    large alphanumeric data,    large volume of numbers,    only numbers

Ans:C ,C


Storage capacity of magnetic disk depends on
Options: A) tracks per inch of surface B) bits per inch of tracks C) disk pack in disk surface D) All of above

Ans:D,D


A computer vision technique that relies on image templates is:
Options: edge detection,    binocular vision,    model-based vision,    robot vision

Ans:C ,C


What is the subnetwork address for a host with the IP address 200.10.5.68/28?
Options: 200.10.5.56,    200.10.5.32,    200.10.5.64,    200.10.5.0

Ans:C ,C


What will be the output of the program if the array begins at address 65486? #include<stdio.h> int main() { int arr[] = {12, 14, 15, 23, 45}; printf("%u, %u\n", arr, &arr); return 0; }
Options: 65486, 65488,    65486, 65486,    65486, 65490,    65486, 65487

Ans:B ,B


It is used to calculate and restructure data for easier analysis of your data. It calculates the sum,
Options: a. Parameter b. Select c. crosstab d. Append

Ans:ndash; c,ndash; c


To select an entire column in MS-EXCEL, press?
Options: CTRL + C B. CTRL + Arrow key C. CTRL + S D. None of the above

Ans:– D ,


How can you totally protect a PC from damage during an electrical storm?
Options: Disconnect the AC power cable,    Disconnect all external cables and power cords,    Use a surge protector,    Turn off the AC power

Ans:A ,A


How can you see the address of the DHCP server from which a client received its IP address?
Options: By using Advanced Properties of TCP/IP,    By using IPCONFIG/ALL,    By using DHCPINFO,    By pinging DHCP

Ans:B ,B


Which of the following is correct in VLSM?
Options: Can have subnets of different sizes B. Subnets must be in same size             C. No required of subnet D. All of above

Ans:– A ,


A report form
Options: appears on the computer monitor during data entry,    is used during report generation to format data,    both (a) and (b),    All of the above

Ans:B ,B


The command used to compare the files is known as
Options: comp,    cmp,    do,    ccp

Ans:B ,B


Single spacing in MS-WORD document causes ____ point line spacing?
Options: 10 B. 12 C. 14 D. 16

Ans:– B ,


The unit of a computer system that executes program, communicates with and often controls the operation of other subsystems of the computer is known as
Options: CPU,    Control Unit,    I/O unit,    Peripheral unit

Ans:A ,A


The binary system uses powers of
Options: 2,    10,    8,    16

Ans:A,(Aanswer

www.000webhost.com