Description : Which of the following statement is incorrect? A. The Addresses Resolution Protocol, ARP, allows a host to find the physicaladdress ofa target host on the samephysical network, given only the target IP address. ... -addresses of our choice to every machine. D. All of theabove E. None of the above
Last Answer : All of theabove
Description : Which of the following is not a type of volatile evidence? a. Routing Table b. Main memory c. Log files d. Cached Data
Last Answer : c. Log files
Description : Most networks employ devices for routing services. Routers work at which of the Following OSI Layers? 1) Transport 2) Network 3) Presentation 4) Session
Last Answer : 2) Network
Description : Most networks employ devices for routing services. Routers work at which of the Following OSI Layers? 1 Transport 2 Network 3 Presentation 4 Session
Last Answer : 2 Network
Description : Cache memory works on the principle of __________ . (1) Locality of data (2) Locality of reference (3) Locality of Memory (4) Locality of Memory & reference
Last Answer : Locality of reference
Description : Which of the following is not type of volatile evidence: A)Routing Tables B) Main Memory C)Log Files D) Cached Data
Last Answer : D) Cached Data
Description : ........... is responsible for converting the higher level protocol addresses to physical Network Addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)
Last Answer : A) Address Resolution Protocol (ARP)
Description : Which protocol does hackers use to make their system seems as your system or another allowed host on your network? a. SNMP protocol b. TCP protocol c. ARP protocol d. ICMP protocol
Last Answer : c. ARP protocol
Description : The Unix Kernel maintains two key data structures related to processes, the process table and the user structure. Which of following information is not the part of user structure? (A) File descriptor table (B) System call state (C) Scheduling parameters (D) Kernel stack
Last Answer : (C) Scheduling parameters
Description : Arrange the following devices in ascending order of the speed: A. RAM B. Hard disk C. Cache D. Floppy 1) ABDC 2) BDAC 3) DBAC 4) BADC
Last Answer : 3) DBAC
Description : ________ is a windows utility program that locates and eliminates unncessary fragments and rearranges filed and unused disk space to optimize operations a) Backup b) Disk cleanup c) Disk defragmenter d) Restore e) None of these
Last Answer : c) Disk defragmenter
Description : The sender is a router thathas receiveda datagram destinedfor a host on thesame network. The logical address that mustbe mapped to a physical address is ______. A) thedestination IP address in the datagram ... IP address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : thedestination IP address in the datagram header
Description : If the sender is a host and wants tosend a packet toanotherhost on another network, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : the IP address of therouter found inthe routing table
Description : In _______forwarding, the full IP address of a destination isgiven in the routing table. A) next-hop B) network-specific C) host-specific D) default
Last Answer : host-specific
Description : What three components determine the address that locates where on a floppy disk the computer will store the data?
Last Answer : a. disk side number, b. track number, and c. sector number.
Description : Which of the following memories has the shortest access times? A) Cache memory B) Magnetic bubble memory C) Magnetic core memory D) RAM
Last Answer : Answer : A
Description : The ALU of a computer responds to the commands coming from A) Primary memory B) Control section C) External memory D) Cache memory
Last Answer : Answer : B
Description : Which of the following memories has the shortest access time? A. Cache memory B. Magnetic Bubble Memory C. Magnetic Core Memory D. None of the above
Last Answer : A. Cache memory
Description : ___________ is a very high speed memory placed in between RAM and CPU. A. Magnetic disk B. Magnetic drum C. Virtual memory D. Cache memory
Last Answer : D. Cache memory
Description : Cache and main memory will not be able to hold their contents when the power is off. They are ________ A. Static B. Dynamic C. Non Volatile D. Volatile
Last Answer : D. Volatile
Description : ______ is the fastest form of RAM but also the most expensive. Due to its cost it is not used as main memory but rather for cache memory: a) SRAM b) DRAM c) SDRAM d) None of These
Last Answer : a) SRAM
Description : You will use _____between main memory & registers to hide "slow" DRAM: a) RAM b) Cache c) ROM d) None of These
Last Answer : RAM
Description : Which memory is fastest among all the memories in a computer: a) RAM b) Cache Memory c) EPROM d) None of These
Last Answer : b) Cache Memory
Description : Which is very high speed semiconductor memory which can speed up CPU: a) Secondary Memory b) Cache Memory c) Primary Memory d) None of These
Description : Cache and main memory will lose their contents when the power is off. They are-- 1) Dynamic 2) Faulty 3) Volatile 4) Static
Last Answer : 3) Volatile
Description : Cache and main memory will lose their contents when the power is off. They are-- 1 Dynamic 2 Faulty 3 Volatile 4 Static
Last Answer : 3 Volatile
Description : What is cache memory?
Last Answer : Cache memory is a small storage area that a processor can access more quickly than from RAM. The CPU will store information already read in from RAM in cache, so that if the same information is needed again, it can be retrieved more quickly.
Description : Cache memory acts between (1) CPU and RAM (2) CPU and ROM (3) RAM and ROM (4) CPU and Hard disk
Last Answer : CPU and RAM
Description : In IT, the method for updating the main memory as soon as a word is removed from the cache is called (1) Write – through (2) Write – back (3) Protected – write (4) Cache – write
Last Answer : Write – back
Description : In IT, associative memory is called as (1) Virtual memory (2) Cache memory (3) Content addressable memory (4) Main memory
Last Answer : Content addressable memory
Description : What is the name of a memory buffer used to accommodate a speed differential ? (1) Cache (2) Stack Pointer (3) Accumulator (4) Disc
Last Answer : Cache
Description : The fastest, costlier and relatively small form of storage managed by computer system hardware is : (1) Disk (2) Flash Memory (3) Main memory (4) Cache
Description : The most advanced form Of Read Only Memory (ROM) is (1) PROM (2) RAM (3) Cache Memory (4) EEPROM
Last Answer : EEPROM
Description : Which memory is used to copy instructions or data currently used by CPU: a. Main memory b. Secondary memory c. Cache memory d. None of these
Last Answer : c. Cache memory
Description : Copy of instruction in cache memory is known as: a Execution cache b. Data cache c. Instruction cache d. Allof these
Last Answer : c. Instruction cache
Description : Copy of data in cache memory is called. a. Datacache b. Execution cache c. Address cache d. Control cache
Last Answer : a. Datacache
Description : In cache memory hit rate indicates. a. Data from requested address is not available b. Data from requested address is available c. Control from requested address is available d. Address from requested address is not available
Last Answer : b. Data from requested address is available
Description : In cache memory miss rate indicates. a. Availability of requested data b. Availability of requested address c. Non-Availability of requested data d. Non-Availability of requested address
Last Answer : c. Non-Availability of requested data
Description : Updating writes to cache data andalsoto___ a. Directories b. Memory c. Registers d. Folders
Last Answer : a. Directories
Description : Which one of the following statements is false regarding the Distributed Cache? a) The Hadoop framework will ensure that any files in the Distributed Cache are distributed to all map and reduce tasks. b) ... Cache on to the slave node before any tasks for the job are executed on that node.
Last Answer : MapReduce tries to place the data and the compute as close as possible
Description : ___ memory system which is discussed later can improve matters in this respect: a. Data memory b. Cache memory c. Memory d. None of these
Last Answer : b. Cache memory
Description : Distance Vector Routing is a……... routing algorithm, it consists of a data structure called a ……… A. Static , routing table B. Dynamic, look-up table C. Dynamic, routing table D. Static, look-up table
Last Answer : C. Dynamic, routing table
Description : ........... is a large kernel, including scheduling file system, networking, device drivers, memory management and more. A) Monolithic kernel B) Micro kernel C) Macro kernel D) Mini kernel
Last Answer : A) Monolithic kernel
Description : ........... is a large kernel containing virtually the complete operating system, including, scheduling, file system, device drivers and memory management. A) Multilithic kernel B) Monolithic kernel C) Micro kernel D) Macro kernel
Last Answer : B) Monolithic kernel
Description : What type of circuit is used by control memory to interconnect registers. a. Data routing circuit b. Address routing circuit c. Control routing circuit d. None of the these
Last Answer : a. Data routing circuit
Description : Which of the following is not a type of volatile evidence a) Routing Tables b) Main Memory c) Log files d) Cached Data
Last Answer : c) Log files
Description : A network consists of eight NT servers. You are planning to move servers to different segments of yournetwork, what utility should be used at eachserver to determine which server generates the most traffic? A. NBTSTAT B. NETSTAT.EXE C. Performance Monitor D. Network Monitor E. ARP.EXE
Last Answer : Network Monitor
Description : Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network? a. ARQ (Automatic Repeat Request) b. ARP (Address Resolution Protocol) c. SLIP (Serial Line Internet Protocol) d. PLIP (Parallel Line Internet Protocol)
Last Answer : b. ARP (Address Resolution Protocol)
Description : The ………………………. protocol was originally developed as a mechanism to enable diskless hosts to be remotely booted over a network as workstations. A. RARP B. ARP C. DHCP D. BOOTP
Last Answer : D. BOOTP