Which layers of the OSI model are host-to-host layers?

Options: Transport, Session, Persentation, Application B. Network, Transport, Session, Presentation C. Datalink, Network, Transport, Session D. Physical, Datalink, Network, Transport

Ans:– A ,

Description: mcqquestions

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 18277 | Level: Moderate


Want to see where do you stand among other aspirants in "Computer" category?

Click Here to take quick 10 mins MCQ test to find out.

Got some suggestion about this question or to make this site better? Please leave your comments below.

More Computer Networks Related questions:

You are working with a class C network. You are required to configure it for five subnets, each of which will support 25 nodes. What subnet should you use?

Ans:B ,B

Data Manipulation Language enables users to
Options: Retrieval of information stored in database B. Insertion of new information into the database C. Deletion of information from the database D. All of the above

Ans:– D ,

How can you break the current column and start a new column immediately?
Options: a. Press Ctrl + Shift + Enter b. Press Alt + Enter c. Press Ctrl + Enter d. Press Alt + Shift + Enter

Ans:– A,– A

What hardware architectures are not supported by Red Hat?
Options: SPARC,    IBM-compatible,    Alpha,    Macintosh

Ans:D ,D

Current is
Options: The flow of charged particles through a material,    An imbalance of electrical charges,    The force that causes electrons to flow,    The number of free electrons in an atom

Ans:A ,A

Which command is used to remove the read permission of the file 'note' from both the group and others?
Options: chmod go+r note,    chmod go+rw note,    chmod go-x note,    chmod go-r note

Ans:D ,D

The _____ is a short horizontal line indicating the conclusion of a document.
Options: a. insertion point b. end mark c. status indicator d. scroll box

Ans:– B,– B

A partitioned data set is most used for
Options: a program or source library,    storing program data,    storing backup information,    storing ISAM files

Ans:A ,A

Storage on PC allows you to store files until something erases it, but memory loses its contents whenever its _____ is lost
Options: static,    disk space,    power,    both a and b above

Ans:C ,C

. __________ is the clear leader for personal databases.
Options: a. Microsoft Access b. Microsoft FoxPro c. Borland dBase d. MySQL

Ans:5 – a ,5 – a

IBM's Micro Channel Architecture (MCA) specifies which type of the following bit access widths?
Options: 8 bit & 16 bit,    16 bit & 24 bit,    16 bit & 32 bit,    32 bit & 64 bit

Ans:C ,C

A search value can be an exact value or it can be
Options: a. Logical Operator b. Relationship c. Wild card character d. Comparison operation

Ans:ndash; c,ndash; c

. Which computer support co-processors?

Options: A) XT computer B) AT comptuers C) None of these D) Both of these


. PowerPoint Application allows you to produce
Options: a. Animated Presentations b. Paper Printouts of Slides c. Notes for the Speaker d. All of the above.

Ans:9 – D ,9 – D

.    Which command displays comma for thousand separating on file size while listing?
Options: a.    Dir/w b.    Dir/s c.    Dir/b d.    Dir/c

Ans:.c,Correct Answer: d. Dir/c

In order to arrange the countries from those with the highest population to those with the lowest, you need to sort on the population field in ……………
Options: ascending order B. descending order C. alphabetical order D. random order

Ans:– B ,

No computer can do anything without a
Options: program,    memory,    chip,    output device

Ans:A ,A

. The __________ field is used to hold a yes or no answer.
Options: a. object b. number c. text d. logical

Ans:9 – d ,9 – d

What will be the output of the program? #include<stdio.h> #define MIN(x, y) (x<y)? x : y; int main() { int x=3, y=4, z; z = MIN(x+y/2, y-1); if(z > 0) printf("%d\n", z); return 0; }
Options: 3,    4,    0,    No output

Ans:A ,A

. Which of the following term means to reckon?
Options: A) putare B) com C) computa D) computar


A dialog box with a bomb appears on a Macintosh screen. What type of problem has occurred?
Options: A RAM problem,    A software problem,    A ROM problem,    An ADB problem

Ans:B ,B

To locate a data item for storage is
Options: Field,    Feed,    Database,    Fetch


AutoCorrect was originally designed to replace _________ words as you type.
Options:  A) Short, repetitive, B) Grammatically incorrect, C) Misspelled, D) None of the above,


Which language was devised by Dr. Seymour Aubrey Papert?
Options: APL,    COBOL,    LOGO,    FORTRAN

Ans:C ,C

What does the port number in a TCP connection specify?
Options: It specifies the communication process on the two end systems B. It specifies the quality of the data & connection C. It specify the size of data D. All of the above

Ans:– A ,

Which of the following are not done by Business Intelligence (BI) systems?
Options: Analyze past and current activities only,    Process and record transactions only,    Both of the above are correct.,    Neither of the above is correct.

Ans:B ,B

Data encryption techniques are particularly useful for
Options: reducing storage space requirements,    improving data integrity,    protecting data in data communication systems,    All of the above

Ans:C ,C

. “New Comment” option can be found under _________ tab
Options: Insert B. Data C. Review D. View

Ans:– C ,

A device which converts human readable data into machine language is
Options: Card reader,    Card punch,    Punched paper tape,    Character reader

Ans:D ,D

Dived logical memory into blocks with the same size as frames are called
Options: Pages B. Frames C. Page Table D. Segmentation

Ans:– A ,

What is the name given to the weapons which use computerised guidance system?
Options: Guided weapons,    Smart weapons,    Dumb weapons,    Starwars weapons

Ans:B ,B

A beam of light used to record and retrieve data on optical disks is known as
Options: polarized light,    unpolarized concentric light,    laser,    coloured light

Ans:C ,C

Which two statements describe the IP address The subnet address is The lowest host address in the subnet is The last valid host address in the subnet is The broadcast address of the subnet is
Options: 1 and 3,    2 and 4,    1, 2 and 4,    2, 3 and 4

Ans:B ,B

Which of the following is not applications software?
Options: Word processing,    Spreadsheet,    UNIX,    Desktop publishing

Ans:C ,C

The action of parsing the source program into the proper syntactic classes is known as
Options: syntax analysis,    lexical analysis,    interpretation analysis,    general syntax analysis

Ans:B ,B

Which language has been selected as the basis for the Japanese "fifth generation" computers.
Options: ALGOL,    COBOL,    PROLOG,    C

Ans:C ,C

Exclusive-OR (XOR) logic gates can be constructed from what other logic gates?
Options: OR gates only,    AND gates and NOT gates,    AND gates, OR gates, and NOT gates,    OR gates and NOT gates

Ans:C ,C

Point out the error in the following program (if it is compiled with Turbo C compiler). #include<stdio.h> int main() { display(); return 0; } void display() { printf("IndiaBIX.com"); }
Options: No error,    display() doesn't get invoked,    display() is called before it is defined,    None of these

Ans:C ,C

All worksheet formula
Options: a. Manipulate values b. Manipulate labels c. Return a formula result d. Use the addition operator

Ans:#8211; c,#8211; c

. Which field type can store photos?
Options: a. Hyperlink b. Ole c. Both of these can be used d. Access tables can’t store photos

Ans:1 – b ,1 – b

Which network topology is considered passive?
Options: Cross,    Bus,    Star,    Mesh


Which of the following products was an early implementation of the relational model developed by E.F. Codd of IBM?
Options: IDMS,    DB2,    dBase-II,    R:base

Ans:B ,B

A skills search requires that the employee file be accessible by
Options: employee position,    applicant file,    employee skill category,    employee name

Ans:C ,C

Internet-like networks between a company and its business partners. Select the best fit for answer:
Options: Bandwidth alternatives,    Switching alternating,    Inter organizational networks,    Extranets

Ans:D ,D

Which of the following is not a part of a Data Flow Diagram?
Options: disk storage,    arrow,    Data store,    process represented by a bubble circle (circle)

Ans:A ,A

Computing systems designed to supply supervisory information include.
Options: invoicing systems,    payroll systems,    process control systems;,    All of the above

Ans:C ,C

. Which of the following is not a field type in access
Options: a. Memo b. Hyperlink c. Ole object d. Lookup wizard

Ans:0 – d ,0 – d

. The number of records contained within a block of data on magnetic tape is defined by the
Options: A) Block definition B) Record contain clause C) Blocking factor D) Record per block


Which option is not available in Insert Table Autofit behavior?
Options:  A) Fixed Column Width, B) AutoFit to Contents, C) Autofit to Window, D) Autofit to Column,


A __ name must be unique within a database
Options: a. Table b. Field c. Record d. Character

Ans:ndash; a,ndash; a