Which of the following is correct regarding Class B Address of IP address


Options: Network bit – 14, Host bit – 16 B. Network bit – 16, Host bit – 14 C. Network bit – 18, Host bit – 16 D. Network bit – 12, Host bit – 14

Ans:– A ,






More Computer Networks Related questions:


Which command will prevent subsequent changes to the file CBT.EXE?
Options: RENAME + r CBT.EXE,    ATTRIB + r CBT.EXE,    COPY + r CBT.EXE,    MODE + r CBT.EXE

Ans:B ,B


Most algorithms begin by _____.
Options: Displaying the input items,    Displaying the output items,    Entering the input items into the computer,    Entering the output items into the computer

Ans:C ,C


For a memory system, the cycle time is
Options: same as the access time,    longer than the access time,    shorter than the access time,    submultiple of the access time

Ans:B ,B


Which of the following is an important characteristic of LAN?
Options: application independent interfaces,    unlimited expansion,    low cost access for low bandwidth channels,    parallel transmission

Ans:A ,A


. The box on …. that allows you to choose where to go and is located below the standard toolbar
Options: a. System menu b. Address bar c. Menu bar d. None of these

Ans:7 – b ,7 – b


The Ziegler-Nichols method:
Options: is a graphical solution method,    can be used to determine gain factors of a PI loop,    is a method of control,    a and b above

Ans:D ,D


A relationship is which of the following?
Options: A person, place, or thing,    Property or characteristic of an entity,    Link between entities,    Weak entity

Ans:C ,C


"The three most important inventions of this century are the nuclear bomb, the high yield hybrid speed, and the computer". Can you name the person who made this statement?
Options: Harry R Jordan,    Buckminster Fuller,    Jack Smith,    Jan Timmer

Ans:B ,B


A station in a network forwards incoming packets by placing them on its shortest output queue. What routing algorithm is being used?
Options: hot potato routing,    flooding,    static routing,    delta routing

Ans:A ,A


How many simultaneous Telnet sessions does a Cisco router support by default?
Options: 2,    3,    4,    5

Ans:D ,D


Which is the Shortcut key to start a presentation from the beginning?
Options: A. F5 B. ALT + F5 C. CTRL + F5 D. SHIFT + F5

Ans:– A ,F5


A branch office, location or other data processing centres, where a newly developed system is used under normal operating conditions for several months, to test it, is called
Options: beta test data,    alpha test data,    string test data,    system test data

Ans:A ,A


Usually, it takes 10-bits to represent one character. How many characters can be transmitted at a speed of 1200 BPS?
Options: 10,    12,    120,    1200

Ans:C ,C


When assessing the table structure of an acquired set of tables with data, determining primary keys is (part of) the:
Options: first step.,    second step.,    third step.,    fourth step.

Ans:B ,B


From a data systems design viewpoint, the number of different types of general ledger entries is
Options: six,    three,    four,    one

Ans:C ,C


The operator used to get value at address stored in a pointer variable is
Options: *,    &,    &&,    ||

Ans:A ,A


Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine?
Options: UDP,    VMTP,    X.25,    SMTP

Ans:A ,A


An AI system developed by Terry A. Winograd to permit an interactive dialogue about a domain he called blocks-world.
Options: SHRDLU,    SIMD,    BACON,    STUDENT

Ans:A ,A


. What was the nick name of the computer used by the Americans in 1952 for their H-bomb project?

Options: A) ENIAC B) EDSAC C) MANIAC D) UNIVAC

Ans:C,C


To insert slide numbers
Options: a. Insert a text box and select Insert >> Page Number b. Insert a textbox and select Insert >> Number >> PageNumber c. Choose Insert >> Slide Number d. Insert a new text box and select Insert >> slide Number

Ans: – D , – D


Error detecting code is
Options: an error-detecting code based on a summation operation performed on the bits to be checked,    a check bit appended to an array of binary digits to make the sum of all the binary digits.,    a code in which each expression conforms to specify rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the error is detected.,    the ratio of the data units in error to the total number of data units

Ans:C ,C


ODL supports which of the following types of association relationships?
Options: Unary,    Unary and Binary,    Unary and Binary and Ternary,    Unary and Binary and Ternary and higher

Ans:B ,B


. Copying a process from memory to disk to allow space for other processes is Called
Options: a. Swapping b. Deadlock c. Demand Paging d. Page Fault

Ans:9 – a ,9 – a


The physical location of a record is determined by a mathematical formula that transforms a file key into a record location in
Options: a tree file,    an indexed file,    a hashed file,    a sequential file

Ans:C ,C


Which of the following is not true about documentation?
Options: Documentation, of a system, should be as clear and direct as possible,    Documentation increases the maintenance time and cost,    Documentation gives better understanding of the problem,    All of the above

Ans:B ,B


. When sharing data in Office, the ________ document is the document in which the data was first entered.
Options: a. source b. destination c. original d. primary

Ans:–  A,–  A


Which is considered a direct entry input device?
Options: Optical scanner,    Mouse,    Light pen,    Digitizer

Ans:E ,E


Which of the following digits are known as the sub-address digits (for use by the user) of the Network User Address (NUA)?
Options: 5-7,    1-4,    8-12,    13-14

Ans:D ,D


A series of AI systems developed by Pat Langley to explore the role of heuristics in scientific discovery.
Options: RAMD,    BACON,    MIT,    DU

Ans:B ,B


Which bitwise operator is suitable for turning on a particular bit in a number?
Options: && operator,    & operator,    || operator,    | operator

Ans:D ,D


Which of the following are types of flow control? Buffering Cut-through Windowing Congestion avoidance
Options: 1 and 2,    1, 3 and 4,    2 only,    3 only

Ans:B ,B


A register in which of the following that holds the current instruction while it is being executed is called instruction register.
Options: ALU,    CPU,    Memory,    Address

Ans:B ,B


With MS-DOS which command will divide the surface of the blank floppy disk into sectors and assign a unique address to each one?
Options: FORMAT command,    FAT command,    VER command,    CHKDSK command

Ans:A ,A


To make possible the efficient on-line servicing of many teleprocessing system users on large computer systems, designers are developing
Options: communication systems,    multiprogramming systems,    virtual storage systems,    All of the above

Ans:D ,D


.   One way to make a PowerPoint slide display animations is to:
Options: a. Select the slide in normal view; and click Format, Animation b. Click the PowerPoint window and move it around vigorously with the mouse for a manual animation effect c. Select the slide in slide sorter view, right click and choose preset animations from the shortcut menu d. PowerPoint does not have an animation feature

Ans:1 – C ,1 – C


    Which command lists the contents of current directory of a disk
Options: a.    Copy b.    Tree c.    Cd d.    Dir

Ans:D,Correct Answer: Dir


Which of the following applies to external DOS commands?
Options: External commands reside in RAM until called,    External commands are stored on disk separately from COMMAND.COM,    External commands must always be used with the /e switch,    External commands can only be executed from a batch file.

Ans:B ,B


. The active cell:
Options: a. is defined by a bold border around the cell. b. Receives the data the user enters. c. It is the formula bar. d. Only A and B.

Ans:– d,– d


In analyzing the compilation of PL/I program, the term "Machine independent optimization" is associated with
Options: recognition of basic syntactic constructs through reductions,    recognition of basic elements and creation of uniform symbols,    creation of more optional matrix,    use of macro processor to produce more optimal assembly code

Ans:C ,C


Topically, how many type III PC cards can you insert in a laptop
Options: 1,    2,    3,    4

Ans:A ,A


A stack pointer is 
Options: a . a 16-bit register in the microprocessor that indicate the beginning of the stack memory. b . a register that decodes and executes 16-bit arithmetic expression. c. The first memory location where a subroutine address is stored. d . a register in which flag bits are stored

Ans:7.a,7.a


What will be the output of the program (sample.c) given below if it is executed from the command line? cmd> sample friday tuesday sunday /* sample.c */ #include<stdio.h> int main(int argc, char *argv[]) { printf("%c", **++argv); return 0; }
Options: s,    f,    sample,    friday

Ans:B ,B


Which of the following is not essential component to perform a mail merge operation?
Options: a. Main document b. Data source c. Merge fields d. Word fields

Ans:– D,– D


Managers who are potential users of the MIS
Options: select the optimum equipment configurations,    evaluate alternate equipment configurations,    describe information needs,    All of the above

Ans:E ,E


Standards are provided by
Options: standards organizations,    user groups,    computer vendors,    All of the above

Ans:D ,D


In Data structure, main characteristic of "ring" is :
Options: last, record points to the first record,    first record points only to the last record,    many records point to one record,    All of the above

Ans:A ,A


What command is used to assign executable permission to the owner of the file named "letter"?
Options: chmod ugo + x letter,    chmod u + x letter,    chmod u + w letter,    chmod g + x letter

Ans:B ,B


The report card and merit list forms the
Options: Output data,    Data processing,    Central Processing,    Input data

Ans:A,(Aanswer


Any data that are entered into the computer, for the first time, will go through the process of
Options: System testing,    Sequential testing,    String testing,    Validation

Ans:D ,D


Data manipulation language (DML)
Options: describes how data are structured in the data base,    specifies for the DBMS what is required; the techniques used to process data,    determine how data must be structured to produce the user's view,    All of the above

Ans:B ,B

www.000webhost.com