Description : If you have implemented a network where hosts are assigned specific roles such as for file sharing and printing. Other hosts access those resources but do not host services of their own. what type of?
Last Answer : What is the answer ?
Description : Which of the following layer protocols are responsible for user and theapplicationprogrammesupport such aspasswords, resource sharing, file transfer and network management? A. Layer 7 protocols B. Layer 6 protocols C. Layer 5 protocols D. Layer 4 protocols E. None of the above
Last Answer : Layer 7 protocols
Description : Making backups, keeping passwords and having access control are used for ………….. (a) Data security -Technology
Last Answer : (a) Backups, access authorised are the techniques to secure data from damage and getting lost.
Description : If I relocate a Backups.backupdb file from one Time Machine drive onto another blank drive, will the Mac simply continue backing up to the volume as normal?
Last Answer : answer:oooh, good question, can’t test it at the moment, im not sure if time machine also identifies the volume of the drive, i’d have to get back on that one, currently not at home i mean, i could relocate it for you on the fly and test, i started fresh so i don’t care if it gets lost
Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none
Last Answer : large numbers of users direct access to the computer for problem solving
Last Answer : 1) large numbers of users direct access to the computer for problem solving
Description : A System in which a transaction access and updates a file quickly enough to affect the original decision making is called 1) Real time system 2) time sharing system 3) both of above 4) None of above
Last Answer : 1) Real time system
Description : The principle of time sharing is 1 large numbers of users direct access to the computer for problem solving 2 large number of user for file sharing 3 both of above 4 none
Last Answer : 1 large numbers of users direct access to the computer for problem solving
Description : A System in which a transaction access and updates a file quickly enough to affect the original decision making is called 1 Real time system 2 time sharing system 3 both of above 4 None of above
Last Answer : 1 Real time system
Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove
Last Answer : All of theabove
Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above
Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files
Description : Which of the following is an application layer service? A) Network virtual terminal B) File transfer, access and management C) Mail service D) All of the above
Last Answer : C) Mail service
Description : Which of the following is an application layer service? a. Remote log-in b. File transfer and access c. Mail service d. All of the above
Last Answer : d. All of the above
Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned
Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users
Description : Which of the following benefit is related to creates resources that are pooled together in a system that supports multi-tenant usage? a) On-demand self-service b) Broad network access c) Resource pooling d) All of the mentioned
Last Answer : On-demand self-service
Description : Which of the following are benefit of IaaS? A. Flexible and efficient renting of computer hardware. B. Portability, interoperability with legacy applications. C. Full control of the computing resources through administrative access to VMs. D. All of the above
Last Answer : All of the above
Description : Which of the following benefit is related to create resources that are pooled together in a system that supports multi-tenant usage? a) On-demand self-service b) Broad network access c) Resource pooling d) All of the mentioned
Description : Which is not a benefit of virtualization? a) Flexible and efficient allocation of resources b) Lowers the cost of IT infrastructure c) Remote access and rapid scalability d) Run on single operating system
Last Answer : Run on single operating system
Description : Which country created the most used networking software in 1980's ? Sun IBM Novell Microsoft Collection From: www.cs-mcqs.blogspot.com
Last Answer : Microsoft
Description : Which among the below mentioned protocols provides a mechanism of acquiring an IP address without manual intervention in addition to plug and play type of networking? a. BOOTP b. DHCP c. Both a & b d. None of the above
Last Answer : b. DHCP
Description : Which of the following are transport layer protocols used in networking? a. TCP and FTP b. UDP and HTTP c. TCP and UDP d. HTTP and FTP
Last Answer : c. TCP and UDP
Description : Which one of the following is not a function of network layer? a. routing b. inter-networking c. congestion control d. error contro
Last Answer : d. error control
Description : At the time Linux 2.0 kernel configuration the option…………………... adds TCP/IP networking to the kernel. A. CONFIG_IP_ACCT B. CONFIG_INET C. CONFIG_INET_PCTCP D. CONFIG_IP_FORWARD
Last Answer : B. CONFIG_INET
Description : A group of computers and other devices connected together is called ……………. A. Network B. Networking C. Intranet D. both b and c
Last Answer : A. Network
Description : Which of the following are used as transport layer protocols in networking? A. TCP and FTP B. UDP and HTTP C. TCP and UDP D. HTTP and FTP
Last Answer : C. TCP and UDP
Description : Which of the following is not the Networking Devices? A. Gateways B. Unix C. Routers D. Firewalls
Last Answer : B. Unix
Description : Physical or logical arrangement of network is __________ a) Topology b) Routing c) Networking d) Control
Last Answer : a) Topology
Description : Which of the following are transport layer protocols used in networking? a) TCP and FTP b) UDP and HTTP c) TCP and UDP d) HTTP and FTP
Last Answer : c) TCP and UDP
Description : How many layers are there in the OSI reference model of networking? a. 8 b. 7 c. 5 d. 4
Last Answer : b. 7
Description : The acronym OSI stands for in computer networking. a. Open Systems Interconnection b. Organization for Standards Institute c. Organizing Systems Interconnection d. Open Systems Interworking
Last Answer : a. Open Systems Interconnection
Description : A group of computers and other devices connected together is called ……………. a. Intranet b. Network c. None of these d. Networking
Last Answer : b. Network
Description : Which of these is a benefit of social networking?
Last Answer : (Apex) Developing and expressing your identity.
Description : Which of the following statements can be associated with OSI model? a. A structured way to discuss and easier update system components b. One layer may duplicate lower layer functionality c. ... no way requires information from another layer d. It is an application specific network model
Last Answer : b. One layer may duplicate lower layer functionality
Description : .Which of the following statements can be associated with OSI model? a. A structured way to discuss and easier update system components b. One layer may duplicate lower layer functionality c. ... no way requires information from another layer d. It is an application specific network model
Last Answer : Functionality at one layer no way requires information from another layer
Description : Terminals are required for a. real-time, batch processing & time-sharing b. real time, time-sharing & distributed message processing c. real time, distributed processing & manager inquiry d. real-time, time sharing & message switching
Last Answer : real-time, time sharing & message switching
Description : The interactive transmission of data within a time sharing system may be best suited to a. simplex lines b. half-duplex lines c. full duplex lines d. biflex-lines
Last Answer : half-duplex lines
Description : The sharing of a medium and its link by two or more devices is called _______. A) modulation B) encoding C) line discipline D) multiplexing
Last Answer : multiplexing
Description : The simultaneousprocessing of twoor more programs by multiple processors is– (A) multiprogramming (B) multitasking (C) time-sharing (D) multiprocessing (E) None of these
Last Answer : multiprocessing
Description : Which of the following statements is correct for the use of packet switching? A. the subdivision of information into individuallyaddressed packets in conjunction with alternativerouting arrangementenabled the transmission path ... capacity could be achieved. D. All of theabove E. None of the above
Description : Which one of the following is NOT a benefit of multiple packaging? A)Facilitates special price offers B)Increases demand C)Increases consumer acceptance of the product D)Makes handling or storage easier E)Provides an overall image of the firm
Last Answer : E)Provides an overall image of the firm
Description : Wireless Access Points For Home Networking?
Last Answer : To improve or expand an existing home or office wireless internet network, an access point comes in handy. A wireless access point basically allows additional Ethernet and Wi-Fi ready ... capabilities, and encryption security. In general, access points cost less than wireless internet routers.
Description : What is the problem and its solution in multiple access transmission in networking?
Last Answer : that of determining who gets to talk (i.e., transmit into the channel), and when.Computer networks similarly have protocols - so-called multiple access protocols - by which nodes regulate their transmission onto the shared broadcast channel.
Description : WAN is a most used abbreviation in Networking, what is its full form? A) WAP Area Network B) Wide Area Network C) Wide Array of Network D) Wireless Access Network
Last Answer : Answer : B
Description : Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking. a. Local networking b. Social engineering c. Physical entry d. Remote networking
Last Answer : d. Remote networking