Which of the following layer of OSI model also called end-to-end layer?


Options: Presentation layer B. Network layer C. Session layer D. Transport layer

Ans: – D ,


Description: mcqquestions

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 17441 | Level: Moderate




Got some suggestion about this question or to make this site better? Please leave your comments below.


Want to see where do you stand among other aspirants in "Computer" Category?

Click Here to take quick 5 mins MCQ test to find out.

More Computer Networks Related questions:


. The command center of access file that appears when you create or open the MS Access database file.
Options: a. Database window b. Query window c. Design view window d. Switchboard

Ans:8 – a ,8 – a


Status indicators are located on the
Options: a. Vertical scroll bar b. Horizontal scroll bar c. Formula bar d. Standard toolbar

Ans:#8211; c,#8211; c


. Copying a process from memory to disk to allow space for other processes is Called
Options: a. Swapping b. Deadlock c. Demand Paging d. Page Fault

Ans:9 – a ,9 – a


It is a query that when run displays its own dialog box prompting you for information, such as
Options: a. Select b. crosstab c. Parameter d. Append

Ans:ndash; c,ndash; c


The shifting of a program from one of the memory addresses to another is
Options: Data transmission,    Data collection,    Relocation,    Database

Ans:C ,C


What will be the output of the program ? #include<stdio.h> int main() { void fun(int, int[]); int arr[] = {1, 2, 3, 4}; int i; fun(4, arr); for(i=0; i<4; i++) printf("%d,", arr[i]); return 0; } void fun(int n, int arr[]) { int *p=0; int i=0; while(i++ < n) p = &arr[i]; *p=0; }
Options: 2, 3, 4, 5,    1, 2, 3, 4,    0, 1, 2, 3,    3, 2, 1 0

Ans:B ,B


Which of the following is an example of a standard IP access list?
Options: access-list 110 permit host 1.1.1.1,    access-list 1 deny 172.16.10.1 0.0.0.0,    access-list 1 permit 172.16.10.1 255.255.0.0,    access-list standard 1.1.1.1

Ans:B ,B


'ITS' stands for
Options: Intelligent Teaching Systems,    International Tutoring Systems,    Intelligent Tutoring Systems,    All of the above

Ans:C ,C


Which of the following is an advantage to using fiber optics data transmission?
Options: resistance to data theft,    fast data transmission rate,    low noise level,   All of the above

Ans:D,All of the above


In mathematics and computer programming, which is the correct order of mathematical operators ?
Options: Addition, Subtraction, Multiplication, Division,    Division, Multiplication, Addition, Subtraction,    Multiplication, Addition, Division, Subtraction,    Addition, Division, Modulus, Subtraction

Ans:B ,B


sp;1. What happens when you click on Insert >> Picture >> Clip Art
Options:  A) It inserts a clipart picture into document, B) It lets you choose clipart to insert into document, C) It opens Clip Art taskbar, D) None of above,

Ans:C,C


The primary purpose of an operating system is to:
Options: make computer easier to use,    keep system programmers employed,    make the most efficient use of the hardware,    allow people to sue the computers

Ans:A ,A


Excel displays the current cell address in the ……….
Options: Formula bar B. Status Bar C. Name Box D. Title Bar

Ans:– C ,


. My Computer was introduced from
Options: a. Windows 3.1 b. Windows 3.11 c. Windows 95 d. Windows 98

Ans: c, c


. MSI is the abbreviation of
Options: A) Medium Scale Integrated B) Medium System Integrated C) Medium Scale Intelligent D) Medium System Intelligent

Ans:A,A


The branch logic that provides decision making capabilities in the control unit is known as
Options: a . controlled transfer b . conditional transfer c . unconditional transfer d . none of above

Ans:8.c,8.c


The effect applied to display when slides changes in slide show view is
Options: a. Slide Animation b. Custom Animation c. Custom Transition d. Slide Transition

Ans: – D , – D


. Which of the following is not a view for interacting with a form object?
Options: a. Datasheet view b. Design view c. Form view d. Layout view

Ans:– d,– d


Which of the following can store information in the form of microscopic pits on metal disks.
Options: Laser disks,    Tape cassettes,    RAM cartridge,    Punched cards

Ans:A,(Aanswer


A standard multimeter is ideal for measuring a monitors high voltage output.
Options: True,    False,    ,    

Ans:B ,B


What is the highest address possible if 16 bits are used for each address?
Options: 65536,    12868,    16556,    643897

Ans:A ,A


The main purpose of time sharing techniques used in computers is to make the best use of the
Options: CPU,    peripherals,    seconday storage,    floppy disks

Ans:A,A


The ability to combine name and addresses with a standard document is called _________
Options: document formatting B. database management C. mail merge D. form letters

Ans:– C ,


Which of the following is private IP address?
Options: 12.0.0.1,    168.172.19.39,    172.15.14.36,    192.168.24.43

Ans:D ,D


RS-449/442-A/423-A is
Options: a set of physical layer standards developed by EIA and intended to replace RS-232-C.,    a check bit appended to an array of binary digits to make the sum of the all the binary digits,    a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression the resulting expression will not conform to the rules of construction and thus the presence of the errors is detected,    the ratio of the number of data units in error to the total number of data units

Ans:A ,A


We have Market Basket data for 1,000 rental transactions at a Video Store. There are four videos for rent -- Video A, Video B, Video C and Video D. The probability that Video D will be rented given that Video C has been rented is known as ________ .
Options: the basic probability,    support,    lift,    confidence

Ans:D ,D


What command is used to print a file?
Options: lp,    pg,    prn,    print

Ans:A ,A


What will be the output of the program under DOS? #include<stdio.h> int main() { char huge *near *far *ptr1; char near *far *huge *ptr2; char far *huge *near *ptr3; printf("%d, %d, %d\n", sizeof(ptr1), sizeof(**ptr2), sizeof(ptr3)); return 0; }
Options: 4, 4, 4,    4, 2, 2,    2, 8, 4,    2, 4, 8

Ans:B ,B


The benefits of a standard relational language include which of the following?
Options: Reduced training costs,    Increased dependence on a single vendor,    Applications are not needed.,    All of the above.

Ans:A ,A


A rectangle represents which of the following in an ERD?
Options: Attribute,    Entity,    Optional One,    Relationship

Ans:B ,B


Which of the following command is used to mount NFS filesystems?
Options: nfsmount,    knfsd,    mount,    All of the above

Ans:C ,C


In Computer System Scanner is ______ Device?
Options: Input B. Output         C. Both D. None

Ans:– A ,


Which menu provides you options like Animation Scheme, custom Animation, Slide Transition?
Options: a. Insert Menu b. Format Menu c. Tools Menu d. Slide Show Menu

Ans: – D , – D


Which of the following statements are correct about the program? #include<stdio.h> int main() { printf("%p\n", main()); return 0; }
Options: It prints garbage values infinitely,    Runs infinitely without printing anything,    Error: main() cannot be called inside printf(),    No Error and print nothing

Ans:B ,B


. The database language that allows you to access or maintain data in a database
Options: a. Dcl b. Dml c. Ddl d. None of above

Ans:7 – a ,7 – a


Which of the following is used to check for errors in RAM chips?
Options: ROM chip,    Microprocessor chip,    Parity chip,    EPROM chip

Ans:C ,C


Which of the following filename extension suggests that the file is a backup copy of another file?
Options: BAK *,    BAS,    COM,    TXT

Ans:A ,A


What will be the output of the program? #include<stdio.h> int main() { int y=128; const int x=y; printf("%d\n", x); return 0; }
Options: 128,    Garbage value,    Error,    0

Ans:A ,A


The Norton current is sometimes called the
Options: Shorted-load current,    Open-load current,    Thevenin current,    Thevenin voltage

Ans:A ,A


What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?
Options: Application,    Host-to-Host,    Internet,    Network Access

Ans:B ,B


The insect type robot Attila is a more competent version of the robot Genghis an weights 1.7 kg. What is the number of microprocessors carried by its body?
Options: 15,    10,    33,    15

Ans:B ,B


Which command is used to remove a table from the database in SQL?
Options: DELETE TABLE,    DROP TABLE,    ERASE TABLE,    UNATTACH TABLE

Ans:B ,B


Which of the following is not one of the major components of decision-support system?
Options: language system,    knowledge system,    expert system,    problem-processing system

Ans:C ,C


The imitation of a systems investigation may result from:
Options: a manager's formal request,    a scheduled system's review,    an analyst's investigation,    All of the above

Ans:D ,D


Data link layer retransmits the damaged frames in most networks. If the probability of a frame's being damaged is p, what is the mean number of transmissions required to send a frame if acknowledgements are never lost.
Options: P I (K + 1),    KIK (1 + F),    1/ (1 - F),    K I (K - P)

Ans:C ,C


What will be the output of the program? #include<stdio.h> #include<string.h> int main() { char *s; char *fun(); s = fun(); printf("%s\n", s); return 0; } char *fun() { char buffer[30]; strcpy(buffer, "RAM"); return (buffer); }
Options: 0xffff,    Garbage value,    0xffee,    Error

Ans:B ,B


. Basic is ________ language.
Options: A) a procedural B) an object oriented C) both A and B D) none of the above

Ans:A,A


What is a portion of memory that serves as a temporary repository for data as it waits for a given action?
Options: Memory Pool,    Cache,    Processor,    Processor pool

Ans:B ,B


Which of the following are the two main components of the CPU?
Options: control unit and registers,    registers and main memory,    control unit and ALU,    ALU and bus

Ans:C,C


Which of the following data constraints would be used to specify that the value of a cell in one column must be less than the value of a cell in another column in the same row of the same table?
Options: A domain constraint,    A range constraint,    An intrarelation constraint,    An interrelation constraint

Ans:C ,C

www.000webhost.com