Which of the following is not the Networking Devices?


Options: Gateways B. Linux             C. Routers D. Firewalls

Ans:– B ,






More Computer Networks Related questions:


In which type of the following OS, the response time is very crucial. A)  Network Operating System B)  Real Time Operating System C)  Batch Operating System D)  Unix Operating System
Options:

Ans:– B ,


What command is used to list the jobs currently in print queues?
Options: lpq,    lpr,    lprm,    lpc

Ans:A ,A


The area of AI that investigates methods of facilitating communication between people and computers is:
Options: natural language processing,    symbolic processing,    decision support,    robotics

Ans:A ,A


What SQL command can be used to delete columns from a table?
Options: MODIFY TABLE TableName DROP COLUMN ColumnName,    MODIFY TABLE TableName DROP ColumnName,    ALTER TABLE TableName DROP COLUMN ColumnName,    ALTER TABLE TableName DROP ColumnName

Ans:C ,C


The pieces of equipment which are attached to the CPU of a computer and which it can access are called
Options: output devices,    control units,    hardware,    disk drive

Ans:E ,E


The examination and changing of single bits or small groups of his within a word is called
Options: Bit,    Byte,    Bit manipulation,    Bit slice

Ans:C ,C


Which is not a factor when categorizing a computer?
Options: Speed of the output device,    Amount of main memory the CPU can use,    Cost of the system,    Capacity of the hard disk

Ans:E ,E


Which layer of OSI determines the interface of the system with the user?
Options: Network,    Application,    Data-link,    Session

Ans:B ,B


The manager attempts to slow down the flow of
Options: machines,    material,    money,    All of the above

Ans:A ,A


. Which is not an external command?
Options: a. Edit b. XCOPY c. Sys d. None of the above

Ans: d, d


Which command is used to select distinct subject (SUB) from the table (BOOK)?
Options: SELECT ALL FROM BOOK,    SELECT DISTINCT SUB FROM BOOK,    SELECT SUB FROM BOOK,    All of the above

Ans:B ,B


What command is used to remove jobs from the print queue?
Options: lpq,    lpr,    lprm,    lpc

Ans:C ,C


A data element in a record, that uniquely distinguishes the record, from all other records, is called
Options: response time,    Key,    System review,    test data

Ans:B ,B


. Each model of a computer has a unique

Options: A) Assembly of a computer B) Machine language C) High level language D) All of the above

Ans:B,B


. Ctrl + O
Options: Save Document B. Print Document C. Close Document D. Open Document

Ans:– D ,


In vi editor, forward search is performed using the command.
Options: :pat,    ?pat,    /pat,    All of the above

Ans:C ,C


. Internal commands are
Options: a. Incorporated in the command.com b. Incorporate in the command directory c. Have external files d. All of the above

Ans:0 – a ,0 – a


Which printer uses a combination of laser-beam & electro photographic techniques.
Options: Laser printers,    Dot-Matrix,    Line printer,    Daisy wheel

Ans:A,A


Which command will create a dynamic pool named Todd that will provide you with 30 global addresses?
Options: ip nat pool Todd 171.16.10.65 171.16.10.94 net 255.255.255.240,    ip nat pool Todd 171.16.10.65 171.16.10.94 net 255.255.255.224,    ip nat pool todd 171.16.10.65 171.16.10.94 net 255.255.255.224,    ip nat pool Todd 171.16.10.1 171.16.10.254 net 255.255.255.0

Ans:B ,B


Which indent marker controls all the lines except first line?
Options:  A) First Line Indent Marker, B) Left Indent Marker, C) Hanging Indent Marker, D) Right Indent Marker,

Ans:-B,-B


Monte Carlo is an example of a(n)
Options: static model,    deterministic model,    optimizing model,    All of the above

Ans:D ,D


The section of the CPU that selects, interprets and sees to the execution of program instructions
Options: Memory,    Register unit,    Control unit,    ALU

Ans:C ,C


What is the name given to the molecular-scale computer?
Options: Femtocomputer,    Nanocomputer,    Supercomputer,    Microcomputer

Ans:B ,B


Which option on the custom animation task pane allows you to apply a preset or custom motion path?
Options: a. Add effect b. Emphasis c. Animate now d. All of the above

Ans: – A , – A


Satellite-Switched Time-Division Multiple Access (SS/TDMA) is
Options: the method of determining which device has access to the transmission medium at any time.,    a medium access control technique for multiple access transmission media,    a form of TDMA in which circuit switching is used to dynamically change the channel assignments,    All of the above

Ans:C ,C


Ctrl + S
Options: a. Save Document with different name b. Save Document with same name c. Save Document and Close Word Application d. Save Document and Print whole Pages

Ans:–  B,–  B


Which of the following chips can be reprogrammed with special electric pulses?
Options: EPROM,    PROM,    ROM,    EEPROM

Ans:D ,D


Avalanche photodiode receivers can detect hits of transmitted data by receiving
Options: 100 photons,    200 photons,    300 photons,    400 photons

Ans:B ,B


Point out the error in the following program (if it is compiled with Turbo C compiler). #include<stdio.h> int main() { display(); return 0; } void display() { printf("IndiaBIX.com"); }
Options: No error,    display() doesn't get invoked,    display() is called before it is defined,    None of these

Ans:C ,C


The two kinds of main Memory are:
Options: Primary and secondary,    Random and sequential,    ROM and RAM,    All of the above

Ans:C,C


The output voltages of a PC power supply are in the form of _____ current.
Options: AC,    DC,    amperage,    resistive

Ans:B ,B


Before any changes to database structure are attempted one should first:
Options: clearly understand the current structure and contents of the database only.,    test any changes on a test database only.,    create a complete backup of the operational database only.,    All of the above should be done.

Ans:D ,D


. Identify the correct statement
Options: A) IBM PCs used RISC CPU designs B) Macintosh used CISC CPU design C) IBM used CISC CPU design D) None of above is true

Ans:C,C


Which provides the fastest data access time?
Options: RAM,    ROM,    CD-ROM,    Hard disk

Ans:A ,A


  Ellipse Motion is a predefined ________
Options: Design Template B. Color Scheme C. Animation Scheme D. None of these

Ans:– C ,


The complexity of linear search algorithm is
Options: a. O(n) b. O(log n) c. O(n2) d. O(n log n)  

Ans:a,a


Eight stations are competing for the use of a shared channel using the 'Adaptive tree Walk Protocol'. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are needed to resolve the contention?
Options: 7 slots,    5 slots,    10 slots,    14 slots

Ans:A ,A


13. The file type _____ indicates the file is a Word document.
Options: a. .msw b. .wor c. .wrd d. .doc

Ans:– D ,– D


2. Which is the valid filename assign in MS-DOS?
Options: a. Ram*.txt b. Ram?.doc c. Ram_$.txt d. None of above

Ans:Correct Answer: c,Correct Answer: c


. A character that represents one or more unknown character is
Options: a. Wildcard character b. All file name c. Extensions d. None of above

Ans:1 – a ,1 – a


. Gutter position can be set in following positions
Options: Left & Right B. Left & Top C. Left & Bottom D. Left Only

Ans:– B ,


Which command is used to terminate a process?
Options: shutdown,    haltsys,    cancel,    kill

Ans:D ,D


Which of the following is the fastest?
Options: CPU,    magnetic tapes and disks,    video terminal,    sensors, mechanical controllers

Ans:A ,A


If a robot can alter its own trajectory in response to external conditions, it is considered to be:
Options: intelligent,    mobile,    open loop,    non-servo

Ans:A ,A


You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports four subnets and a maximum number of hosts?
Options: 255.255.255.192,    255.255.255.224,    255.255.255.240,    255.255.255.248

Ans:B ,B


. What program runs first aftercomputer is booted and loading GUI?
Options: a. Desktop Manager b. File Manager c. Windows Explorer d. Authentication

Ans: d, d


When you ping the loopback address, a packet is sent where?
Options: On the network,    Down through the layers of the IP architecture and then up the layers again,    Across the wire,    through the loopback dongle

Ans:B ,B


. The Search tool is best used when searching for ______ data.
Options: a. simple b. multiple c. unique d. formatted

Ans:6 – a ,6 – a


The examination and changing of single bits or small groups of his within a word is called
Options: Bit,    Byte,    Bit manipulation,    Bit slice

Ans:C,(Canswer


Which method is frequently used, especially in the early stages of design?
Options: The iterative design method,    The direct method,    The design selection method,    All of the above

Ans:A ,A

www.000webhost.com