What is the typical range of Ephemeral ports?


Options: 1 to 80 B. 1 to 1024 C. 80 to 8080 D. 1024 to 65535

Ans: D ,D. 1024 to 65535


Description: www.ncftp.com/ncftpd/doc/misc/ephemeral_ports.html






More Computer Networks Related questions:


Advantage(s) of using assembly language rather than machine language is (are):
Options: It is mnemonic and easy to read.,    Addresses any symbolic, not absolute,    Introduction of data to program is easier,    all of the above

Ans:D ,D


When operating above its resonant frequency, a series RLC circuit has the characteristics of a:
Options: series RL circuit,    series RC circuit,    series RLC circuit operated below its resonant frequency,    purely resistive circuit

Ans:A ,A


Which of the following is correct way to define the function fun() in the below program? #include<stdio.h> int main() { int a[3][4]; fun(a); return 0; }
Options: void fun(int p[][4]) { } ,    void fun(int *p[4]) { } ,    void fun(int *p[][4]) { } ,    void fun(int *p[3][4]) { }

Ans:A ,A


. Programs designed to perform specific tasks is known as
Options: A) system software B) application software C) utility programs D) operating system

Ans:B,B


The physical location of a record is determined by a mathematical formula that transforms a file key into a record location in
Options: a tree file,    an indexed file,    a hashed file,    a sequential file

Ans:C ,C


The current gain of a transistor is defined as the ratio of the collector current to the
Options: base current,    emitter current,    supply current,    collector current

Ans:A ,A


While creating relationship, when you drag a field of a field to drop into another table the mouse pointer changes into
Options: a. a doctor’s sign b. thin + sign c. outline rectangle d. None of above

Ans:ndash; c,ndash; c


Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?
Options: Layer 7 protocols,    Layer 6 protocols,    Layer 5 protocols,    Layer 4 protocols

Ans:A ,A


A LISP environment consists of a language, a programming environ¬ment, and:
Options: random-access storage,    a processor,    a large address,    a set of functions

Ans:D ,D


You see the message "invalid media device" after installing a new hard drive. What do you do next?
Options: Format,    Fdisk,    Partition,    Add the OS

Ans:A ,A


What will be the output of the program (myprog.c) given below if it is executed from the command line? cmd> myprog one two three /* myprog.c */ #include<stdio.h> int main(int argc, char **argv) { printf("%c\n", **++argv); return 0; }
Options: myprog one two three,    myprog one,    o,    two

Ans:C ,C


Super-computers
Options: Are found at thousands of sites around the world,    Can now fit on a single silicon chip,    Are usually designed to process accounting applications,    Are not fast enough for some applications

Ans:D ,D


. Which of the following command is used to ask you to confirm that you want to delete the directory?
Options: a. Deltree/f b. Erase *.* c. Deltree *.* d. Del *.*/p

Ans:0 – d ,0 – d


Which of the following is an integrated collection of data with minimum redundancy, so that different applications can use the required data.
Options: records,    file,    DBMS,    schema

Ans:C ,C


Which of the following is not a limitation of binary search algorithm?
Options: a. must use a sorted array b. requirement of sorted array is expensive when a lot of insertion and deletions are needed c. there must be a mechanism to access middle element directly d. binary search algorithm is not efficient when the data elements are more than 1000.

Ans:- d,- d


The complexity of merge sort algorithm is
Options: A)O(n) b.O(log n) c.O(n2) d.O(n log n)

Ans:D,


Which of the following command is used to mount NFS filesystems?
Options: nfsmount,    knfsd,    mount,    All of the above

Ans:C ,C


Which of the following isn't used in the storage phase of a computer-based information system?
Options: Magnetic,    Keyboard,    Diskette,    Hard disk

Ans:B ,B


.   To give a PowerPoint presentation to a large audience, you:
Options: a. Set up your computer in a large auditorium, and click large, auditorium, OK b. Click the slide you wish the audience to see in normal view, then click the next slide, and so on. c. Choose either view, slide show or slide show, view show d. Slick slide show, OK

Ans:5 – C ,5 – C


The most prominent system in the retail sales industry is the _____ system.
Options: POS (point-of-scale),    COBOL,    ACM,    PC/XT

Ans:A ,A


What does the acronym ISDN stand for?
Options: Indian Standard Digital Network,    Integrated Services Digital Network,    Intelligent Services Digital Network,    Integrated Services Data Network

Ans:B ,B


RS-232-G
Options: is an interface between two data circuit terminating equipment as examplified by a local and remote modem,    is an interface standard between Data terminal Equipment and Data Circuit Terminating Equipment,    specifies only the mechanical characteristics of an interface by providing a 25-pin connector,    requires only 7 pin out of 25 in order to transmit digital data over public telephone lines

Ans:B ,B


.  A report module includes code for all event _______ triggered by events occurring on a specific report or its controls.
Options: a.            properties b.           procedures c.           macros d.            commands

Ans:– b,– b


How many pairs of stations can simultaneously communicate on Ethernet LAN?
Options: 1,    2,    3,    multiple

Ans:A ,A


You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use?
Options: 255.255.255.192,    255.255.255.224,    255.255.255.240,    255.255.255.248

Ans:B ,B


Magnetic disks are the most popular medium for
Options: A) Direct access B) Sequential access C) Both of above D) None of above

Ans:-D,-D


In which of the following terminals the screen is regarded as an array of pixels, where each pixel is either on or off?
Options: Character map terminal,    Bit map terminal,    RS-232 C terminal,    All of the above

Ans:B ,B


The first electronic digital computer contained?
Options: Electronic valves,    Vacuum tubes,    Transistors,    Semiconductor memory

Ans:B ,B


When a top-level function is entered, the LISP processor do(es)
Options: It reads the function entered,    It evaluates the function and the function's operands,    It prints the results returned by the function.,    All of the above

Ans:D ,D


. Which of the following in not Outer join?
Options: Left outer join B. Right outer join C. Full outer join D. All of the above

Ans: – D ,


Which of the following commands is used to copy directory structures in and out
Options: cp,    cpio,    cp - p,    copy

Ans:B ,B


An operational amplifier:
Options: can be used to subtract two or more signals,    can be used to sum two or more signals,    uses the principle of feedback,    All of the above

Ans:D ,D


What is the result of adding an IP address to the DNS server search order
Options: It restricts browsing to that DNS server,    It overrides the local systems IP address,    It tells the DNS Server where the local system is located,    It tells the local system where the DNS Server is located

Ans:D ,D


A datum that indicates some important state in the content of input or output is
Options: Sequence,    Sentinel,    SIO,    Sibling

Ans:B,(Banswer


. The computer that process both analog and digital is called
Options: A) Analog computer B) Digital computer C) Hybrid computer D) Mainframe computer

Ans:C,C


. What are the computers called that performs calculations and comparisons usually in the binary numbering system?
Options: A) Analog Computers B) Digital Computers C) Hybrid Computers D) None of above

Ans:B,B


Which is true for the digital computer?
Options: It is less accurate than the analog computer,    It represents the decimal numbers through a string of binary digits,    It is used primarily in scientific applications,    Both (a) and (c)

Ans:B ,B


The no of logical records in a physical record is
Options: Group,    Blocking factor,    Sector,    Field

Ans:B ,B


. Presentation designs regulate the formatting and layout for the slide and are commonly called
Options: a. Design templates b. Templates c. Placeholders d. Blueprints

Ans:4 – B ,4 – B


What problem is solved by Dijkstra's banker's algorithm?
Options: mutual exclusion,    deadlock recovery,    deadlock avoidance,    cache coherence

Ans:C ,C


What is the jumper setting on a SCSI device to configure it to use the fourth SCSI id? Remember, SCSI ids start with zero.
Options: 010,    110,    011,    101

Ans:C ,C


The language that is an input for statement translation is called
Options: Assembly language,    Source language,    High-level language,    Object language

Ans:B,B


The average time necessary for the correct sector of a disk to arrive at the read write head is _____
Options: Down time,    Seek time,    Rotational delay,    Access time

Ans:C,(Canswer


.   Which type of font is best suitable for large amount of text?
Options: a. serif fonts b. sans serif fonts c. text fonts d. picture fonts

Ans:4 – A ,4 – A


Which of the following provides a means of printing out feature notes with a miniature slide on a printed page?
Options: a. Slide with animation b. Outline view c. Notes page d. Audience handout

Ans: – D , – D


In laser technology, what happens during the transfer stage?
Options: Residual toner is transferred to the waste receptacle,    The laser transfers the image from the drum to the paper,    The image is transferred from the drum to the paper,    A negative charge is transferred to the surface of the drum

Ans:C ,C


What is the benefit of the Networking?
Options: File Sharing B. Easier access to Resources C. Easier Backups D. All of the Above

Ans:– D ,


A consideration evaluated by management when planning to convert to a computer system is :
Options: maintenance,    available software,    CPU sized speed,    All of the above

Ans:D ,D


. The category of operating system that you most likely have running on your PDA computer is a_________Operating system
Options: a. Real time b. Single user, single task c. Single user, multitask d. Multiuser, multitask

Ans:5 – b ,5 – b


An intrusion detection system does not perform which of the following?
Options: Tries to identify attempts to hack into a computer system.,    May monitor packets passing over the network.,    May transmit message packets to the correct destination.,    Set up deception systems that attempt to trap hackers.

Ans:C ,C

www.000webhost.com