Computer-Networking (Set 1)
Computer-Networking (Set 1)
1 of 1 sets
2. The identity management system binds logical addresses to for reputed servers.
A. mac address
B. specific programs
o m
C. other computers
. c
D. none of them
te
Answer:A a
q M
3. IPS in firewall stands for .
c
M
A. intrusion protection system
B. intrusion prevention software
C. internet prevention system
D. intrusion prevention system
Answer:D
14. Computers and devices can be connected using technology to create a network.
A. wired
B. wireless
C. both a & b
D. neither a nor b
Answer:C
18. are the hardware devices that help the computer to connect to a network.
A. routers
B. modems
C. wireless modems
D. all of them
Answer:D
23. A program which runs in the background and sends results requested by a
client is called a .
A. server
B. client
C. port
D. ip address
Answer:A
26. The design adopted for connecting several hosts on a network is called .
A. telephony
B. wiring
C. connection
D. topology
Answer:D
29. Usually, the network connecting hosts inside a single building is called .
A. lan
B. wan
C. man
D. none of them
Answer:A
30. Usually, the network connecting hosts located in several cities or nations is
called .
A. lan
31. When network hosts are connected without wires, protocol is used.
A. lan
B. wan
C. man
D. wlan
Answer:D
34. Hub is to switch/ bridge since it repeats data even to the unwanted connections.
A. inferior
B. superior
C. equivalent
D. none of them
Answer:A
36. The device which connects one Local Area Network to another Local Area
Network is called
A. hub
B. switch
C. modem
D. bridge
Answer:D
37. A cable with single copper core and braided metal shield is called .
A. unshielded twisted cable
B. shielded twisted cable
C. coaxial cable
D. fibre optic cable
Answer:C
38. Fibre optic cables are interferences from electric cables and electromagnetic
waves.
A. prone to
B. unaffected by
C. susceptible to
D. affected by
Answer:B
40. In the modern days, is the best choice for wireless networking.
53. In a client server network, the ports in the range of 0 to 1023 are called ports.
A. relational ports
B. general ports
C. well known ports
D. user ports
Answer:C
74. The FTP server which does not require login process is called .
A. hyper text transmission protocol
B. simple mail transfer protocol
C. network time protocol
D. anonymous file transfer protocol
Answer:D
75. Using FTP, a file can be copied from remote system to the local system using
the command .
76. Using FTP, a file can be copied from local host to remote host using the
command .
A. get
B. put
C. cd
D. lcd
Answer:B
77. Using FTP, working directory on the remote host can be changed using the
command .
A. pwd
B. put
C. cd
D. lcd
Answer:C
78. Using FTP, working directory on the local host can be changed using the
command .
A. pwd
B. bye
C. cd
D. lcd
Answer:D
79. Using FTP, list of files on the remote host can be viewed using the command .
A. pwd
B. bye
C. cd
D. lcd
Answer:A
81. Using FTP, connection to remote FTP server may be terminated using the
command .
A. delete
B. bye/ quit
C. cd
D. lcd
Answer:B