Which of the following can be Software?


Options: Routers B. Firewalls C. Gateway D. Modems

Ans:– B ,


Description: mcqquestions






More Computer Networks Related questions:


With a dot matrix printer, light then dark print is most commonly caused by:
Options: Erratic paper advancement,    Erratic ribbon advancement,    Misalligned print head,    Overheating print head

Ans:B ,B


Which of the following technique is used for fragment?
Options: a technique used in best-effort delivery systems to avoid endlessly looping packets,    a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame,    one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size,    All of the above

Ans:C ,C


What command is used to change the working directory?
Options: cdir,    chdir,    changedir,    cd

Ans:D ,D


. Which of these toolbars allows changing of Fonts and their sizes?
Options: a. Standard b. Formatting c. Print Preview d. None of these

Ans:–  B,–  B


Which of the following would be good reasons to run NAT? You need to connect to the Internet and your hosts don't have globally unique IP addresses. You change to a new ISP that requires you to renumber your network. You don't want any hosts connecting to the Internet. You require two intranets with duplicate addresses to merge.
Options: 1, 2 and 4,    2 and 4,    3 only,    All of the above

Ans:A ,A


You have just installed a new internal PCI modem on you desktop. It will not dial out. what is the problem?
Options: The port speed is set too high,    the modem has not been set up in control panel properties,    the phone line is plugged into the line-in port on the modem card,    the phone line out of the wall is plugged into the phone port on the modem card

Ans:D ,D


Data encryption techniques are particularly useful for
Options: reducing storage space requirements,    improving data integrity,    protecting data in data communication systems,    All of the above

Ans:C ,C


A random-access data storage device which gives rapid access to data is
Options: Magnetic tape,    Punched card,    Disk storage unit,    Buffer

Ans:C ,C


One byte can be used to encode any integer between 'O' and -inclusive
Options: 16,    256,    128,    255

Ans:D ,D


To center worksheet titles across a range of cells, you must
Options: a. Select the cells containing the title text plus the range over which the title text is to be centered b. Widen the columns c. Select the cells containing the title text plus the range over which the title text is to be enfettered d. Format the cells with the comma style

Ans:#8211; a,#8211; a


. On the works cited page, list works by each author’s last name and _____ the title of the work.
Options: a. italicize or underline b. boldface or italicize c. underline or boldface d. enlarge or underline

Ans: – A , – A


When you have finished entering information into a form
Options: the template is written to the data file,    the contents of the form are written to the data file,    the contents of the form can be printed,    All of the above

Ans:B ,B


In an absolute loading scheme, which loader function is accomplished by loader?
Options: Reallocation,    Allocation,    Linking,    Loading

Ans:D ,D


Concatenation of text can be done using
Options: a. Apostrophe ,b. Exclamation, c. Hash , d. Ampersand

Ans:d,Ampersand


Data transformation includes which of the following?
Options: A process to change data from a detailed level to a summary level,    A process to change data from a summary level to a detailed level,    Joining data from one source into various sources of data,    Separating data from one source into various sources of data

Ans:A ,A


You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many hosts can have IP addresses on the LAN attached to the router interface?
Options: 6,    8,    30,    32

Ans:A ,A


. What is an index?
Options: a. A wizard that creates a functional database structure based on the user’s selections b. A widely recognized naming convention for database objects c. A sort order for records, which is identified in the table design d. A set of relationship rules that enforce defined database relationships

Ans:4 – c ,4 – c


How was the generation of computer classified?
Options: by the device used in memory & processor B. by the speed of computer C. by the model of the computer D. by the accuracy of computer

Ans:– A ,


The daily processing of corrections to customer accounts best exemplifies the processing mode of:
Options: Batch processing,    Real-time processing,    Time-sharing,    Offline processing

Ans:A ,A


In magnetic disks, data is organized on the platter in a concentric sets of rings called
Options: sector,    track,    head,    block

Ans:B ,B


A connection between two end points, either physical or logical, over which data may travel in both directions simultaneously is called _____
Options: Dump point,    Datalink,    Duplex,    Networks

Ans:C ,C


What does the command routerA(config)#line cons 0 allow you to perform next?
Options: Set the Telnet password.,    Shut down the router.,    Set your console password.,    Disable console connections.

Ans:C ,C


Who invented Java?
Options: Netscape,    Microsoft,    Sun,    None of the above is correct.

Ans:C ,C


A common example of a data storage medium is
Options: cartidge,    floppies,    cluge,    disk

Ans:D ,D


When a new trunk link is configured on an IOS-based switch, which VLANs are allowed over the link?
Options: By default, all VLANs are allowed on the trunk.,    No VLAN's are allowed, you must configure each VLAN by hand.,    Only configured VLAN's are allowed on the link.,    Only extended VLAN's are allowed by default.

Ans:A ,A


Which peripheral port provides the FASTEST throughput to laser printers?
Options: RS-232,    SCSI,    Parallel,    Serial

Ans:C ,C


14. What is the name of the latest server operating system developed by Microsoft?
Options: a. Windows NT b. Windows 2000 c. Windows XP d. Windows 2003

Ans:Correct Answer: d,Correct Answer: d


What is the frequency range of the IEEE 802.11g standard?
Options: 2.4Gbps,    5Gbps,    2.4GHz,    5GHz

Ans:C ,C


Which of the following SQL statements are helpful in database redesign?
Options: Correlated subqueries only,    EXISTS/NOT EXISTS expressions only,    Both of the above are helpful,    None of the above are helpful.

Ans:C ,C


Which of the following affects the extent to which you are involved with the system development life cycle in your company?
Options: your job description,    size of the organization,    your relevant experience,    All of the above

Ans:E ,E


Computer-based traffic control systems are implemented at the _____ level of government.
Options: Local,    Top,    bottom,    Top-to-bottom

Ans:A ,A


The complete picture of data stored in database is known as
Options: Record,    Schema,    System flowchart,    DBMS

Ans:B ,B


In a _____ a parent record type can be linked to one or more "child" record types, but a child record type can have only one parent.
Options: Network database,    Relational database,    Distributed database,    Hierarchical database

Ans:D ,D


. Which command be used to clear the screen and display the operating system prompt on the first line of the display?
Options: a. Cd b. Md c. Rename d . cls

Ans:Correct Answer: d ,Correct Answer: d


. Size of the primary memory of a PC ranges between
Options: A) 2KB to 8KB B) 64KB & 256KB C) 256KB & 640KB D) None of these

Ans:C,C


Which of the following is associated with networks?
Options: Download, node,    Star topology,    Point-to-Point,    Both (a) and (b)

Ans:D ,D


In Computer System Scanner is ______ Device?
Options: Input B. Output         C. Both D. None

Ans:– A ,


Which of the following way(s) the information system and capability are related to each other:
Options: improved processing speed,    increased volume of activities,    faster retrieval of information,    All of the above

Ans:D ,D


Artificial intelligence is
Options: the embodiment of human intellectual capabilities within a computer.,    a set of computer programs that produce output that would be considered to reflect intelligence if it were generated by humans.,    the study of mental faculties through the use of mental models implemented on a computer.,    All of the above

Ans:D ,D


Resistance is measured in units of:
Options: ohms,    farads,    helids,    amperes

Ans:A ,A


System design aid should primarily
Options: help analyse both data and activities,    help in documentation,    help in programming,    generate code

Ans:A ,A


The model for a _____ resembles the hierarchical model in many respects.
Options: Network database,    Relational database,    Distributed database,    Hierarchical database

Ans:A ,A


Suppose the zener diode has a breakdown voltage of 10 V and zener resistance of 8.5 W, what is the additional voltage when the current is 20 mA?
Options: 0.17 V,    10.17 V,    20 V,    18.8 V

Ans:A ,A


. You can use the formula pallette to
Options: a.  format cells containing numbers b.  create and edit formula containing functions c.  enter assumptions data d.  copy a range of cells

Ans:– b,– b


17. Which command is used to set a name to a disk in DOS?
Options: a. VOLUME b. VOL c. LABEL d. DISKLABEL

Ans:Correct Answer: c,Correct Answer: c


Eliminating modification anomalies is a(n) ________ of normalization.
Options: advantage,    disadvantage,    either an advantage or disadvantage,    neither an advantage nor disadvantage

Ans:A ,A


First generation computers are characterised by
Options: Vaccum tubes and magnetic drum,    Minicomputers,    Magnetic tape and transistors,    All of the above

Ans:A,A


Word has Web authoring tools allow you to incorporate _____ on Web pages.
Options: a. bullets b. hyperlinks c. sounds d. all of the above

Ans:– D,– D


Data collection terminals gather data for use by the
Options: inventory subsystem,    cost subsystem,    production subsystem,    All of the above

Ans:D ,D


If the transient response of a system is overdamped:
Options: the value of the output exceeds the value of the input at times during the transient period.,    the value of the output never exceeds the value of the input during the transient period.,    the value of the output never stabilizes.,    All of the above

Ans:B ,B

www.000webhost.com