Description : Which of the following is not describedas a typicalnetwork classification? A) Local areanetwork B) Wide area network C) Metropolitan areanetwork D) County area networ
Last Answer : County area network
Description : Membership in a VLAN can be based on _________. A) port numbers B) MAC addresses C) IP addresses D) all of theabove
Last Answer : all of theabove
Description : _________ utilization is the useof availablebandwidthto achieve specificgoals. A) Frequency B) Bandwidth C) Amplitude D) None of the abov
Last Answer : Bandwidth
Description : In IPv6,a ______address is used ifa site with several networks uses the Internetprotocols but is not connectedto the Internet for security reasons. A) link local B) site local C) mapped D) none of the abov
Last Answer : site local
Description : Bluetooth is a _______ technology that connects devices (called gadgets) ina small area. A) wired LAN B) wirelessLAN C) VLAN D) none of the above
Last Answer : wirelessLAN
Description : The …………………... option tells netstat to display the status of all configured network interfaces. A. -n B. -i C. either a or b D. neither a nor b
Last Answer : B. -i
Description : _________ is a data area shared by hardware devices or program processes that operate at different speeds or with different sets of priorities. A. Flash memory B. Virtual memory C. Buffer D. None of the Above
Last Answer : C. Buffer
Description : A _________ network is across between a circuit-switchednetworkand a datagram network. It has some characteristics ofboth. A) virtual-circuit B) packet-switched C) frame-switched D) none of the above
Last Answer : virtual-circui
Description : In ATM,a virtual connection is definedby _________. A) VPI B) VCI C) DLCI D) acombination of (a) and (b)
Last Answer : acombination of (a) and (b)
Description : In a ________ network, twotypes of addressing are involved: global and local. A) virtual-circuit B) datagram C) circuit-switched D) none of the above
Last Answer : virtual-circuit
Description : Bluetooth is an example of __________ a) personal area network b) local area network c) virtual private network d) wide area network
Last Answer : a) personal area network
Description : HMP (Host Monitoring Protocol) is: A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... used to monitor computers D. a protocol that handles error andcontrol messages E. None of the above
Last Answer : a protocol used to monitor computers
Description : ICMP (Internet Control Message Protocol) is A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... to monitor computers D. a protocol that handles error andcontrol messages E. None of the above
Last Answer : a protocol that handles error andcontrol messages
Description : The physical layer translates logical communication requests from the ______ into hardware specific operations. a. data link layer b. network layer c. trasnport layer d. application layer
Last Answer : a. data link layer
Description : The most basic function of ifconfig command is assigning the …………….. Address. A. Physical address B. Hardware address C. MAC address D. IP address
Last Answer : D. IP address
Description : Floppy disks typically in diameter a. 3‛ b. 5.25‛ c. 8‛ d. All of abov
Last Answer : All of abov
Description : The maximum frame length for 10-Mbps Ethernet is ________ bytes. A) 1518 B) 1500 C) 1200 D) none of the abov
Last Answer : 1518
Description : A bridge can use the _________algorithm tocreate aloopless topology. A) binary tree B) spanning tree C) multiway tree D) none of the abov
Last Answer : spanning tree
Description : ___ cable can carry signals ofhigher frequency ranges than_____ cable. A) Twisted-pair; fiber-optic B) Coaxial; fiber-optic C) Coaxial; twisted-pair D) none of the abov
Last Answer : Coaxial; twisted-pair
Description : In_________ transmission, we send bits oneafter another without startor stop bits or gaps. It is the responsibilityof the receiver togroup the bits. A) synchronous B) asynchronous C) isochronous D) none of the abov
Last Answer : synchronous
Description : ______ finds the value of thesignal amplitudefor eachsample; ____ finds the change from the previous sample. A) DM; PCM B) PCM; DM C) DM; CM D) none of the abov
Last Answer : PCM; DM
Description : The most common technique to change an analog signal to digitaldata is called __________. A) PAL B) PCM C) sampling D) none of the abov
Last Answer : PCM
Description : In IPv6,options are inserted between the _________and the ___________ data. A) baseheader;extensionheader B) baseheader;upper-layer data C) base header; frame header D) noneof the abov
Last Answer : baseheader;upper-layer data
Description : In SQL, which command(s) is(are) used to change atable's storage characteristics? A. ALTER TABLE B. MODIFY TABLE C. CHANGE TABLE D. All of theabove E. None of the abov
Last Answer : ALTER TABLE
Description : _____defines how a particular pattern to be interpreted,and whataction is tobe taken based on that interpretation. A) Semantics B) Syntax C) Timing D) None of the abov
Last Answer : Semantics
Description : An error in software or hardware is called a bug. What is the alternative computer jargon for it? a. Leech b. Squid c. Slug d. Glitch
Last Answer : Glitch
Description : Software in computer a. Enhances the capabilities of the hardware machine b. Increase the speed of central processing unit c. Both of above d. None of above
Last Answer : Enhances the capabilities of the hardware machine
Description : Which of the following is required to communicate between two computers? a. communications software b. protocol c. communication hardware d. all of above including access to transmission medium
Last Answer : all of above including access to transmission medium
Description : The performance of data communications network depends on .............. A) Number of users B) The hardware and software C) The transmission D) All of the above
Last Answer : D) All of the above
Description : Which of the following is another name for the system virtual machine? a) hardware virtual machine b) software virtual machine c) real machine d) none of the mentioned
Last Answer : hardware virtual machine
Last Answer : VMM
Description : _________ media transportelectromagnetic waves without the use ofa physical conductor. A) Guided B) Unguided C) Either (a) or (b) D) None of the above
Last Answer : Unguided
Description : The data link layer takes the packets from _________ and encapsulates them into frames for transmission. a) network layer b) physical layer c) transport layer d) application layer
Last Answer : a) network layer
Description : A ________is a local address. Its jurisdiction is overa local network. A) physical B) logical C) a and b D) noneof the above
Last Answer : physical
Description : _________ is a generic term for organized collection of computer data and instructions. A. firmware B. Software C. hardware D. None of the above
Last Answer : B. Software
Description : _________ is a combination of hardware and software that facilitates the sharing of information between computing devices. a) Network b) Peripheral c) Expansion Board d) Digital Device
Last Answer : a) Network
Description : The _________ of a system includes the programs or instructions 1) Hardware 2) Icon 3) Information 4) Software
Last Answer : 4) Software
Description : A _________ is a cloud computing service that is both hardware and software. a) service b)platform c) model d) all of the mentioned
Last Answer : platform
Last Answer : VLAN - Virtual Local Area Network
Description : Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server? 1) DSL modem 2) A multi-homed firewall 3) VLAN 4) A brouter that acts both as a bridge and a router
Last Answer : 2) A multi-homed firewall
Description : Mention what are the networking options used in OpenStack a. Flat Network Manager: IP addresses for VM instances are fetched from the subnet, and then injected into the image on launch b. Flat DHCP Network ... is started for each VLAN to pass out IP addresses to VM instances. d. All of the above
Last Answer : All of the above
Description : Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server? 1 DSL modem 2 A multi-homed firewall 3 VLAN 4 A brouter that acts both as a bridge and a router
Last Answer : 2 A multi-homed firewall
Description : The physical devices of a computer: a) Software b) Package c) Hardware d) System Software
Last Answer : Answer: c Explanation: Hardware refers to the physical devices of a computer system. Software refers to a collection of programs. A program is a sequence of instructions
Description : Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _____security is concerned with protecting software from unauthorized tampering or damage: a) Data b) Cyber c) Internet d) Meta Physical e) Publicity
Last Answer : b) Cyber
Description : Physical components that make up your computer are known as ..... 1) Operating Systems 2) Software 3) Hardware 4) Web Browsers
Last Answer : 3) Hardware
Description : Which of the following is the appropriate definition of Information Technology? (A) Information Technology refers to the use of hardware and software for pr ocessing information (B) Information ... of principles of Physical sciences and Social sciences for processing of information of many kinds.
Last Answer : Answer: C
Description : Which of the following is not the responsibility of the utilities component of DBMS software? A. creating the physical and logicaldesigns B. removingflaggedrecords for deletion C. creatingand maintaining the data dictionary D. monitoring performance E. None of the above
Last Answer : creating the physical and logicaldesigns
Description : How do I remove an Ethernet alias which is not configured?
Last Answer : What is it you are actually trying to remove, something virtual, IE, a program, or something physical, or disable something physical like a video card, etc?