Answer with Explanation
1. What is the full form of CSMA?
[A] Carrier Sense
Multiple Access
[B] Collision Sense Model Arrangement
[C] Carrier Sense Model Access
[D] None of the Above
Explanation:
The most common access method of the bus topologies is CSMA or Carrier Sense
Multiple Access. It is a media access control used to control the data flow so
that data integrity is maintained so that the packets do not get lost.
2. Which of the following devices has high bandwidth?
[A] Switch
[B] Router
[C] Modem
[D] Bridge
Explanation:
A network switch is a computer networking device that connects devices on a
computer network by using packet switching to receive, process, and forward
data to the destination device.
3. Which of the following
noise may occur when signals at different frequencies share the same
transmission medium?
[A] White noise
[B] Intermodulation
noise
[C] Cross talk
[D] Impulse noise
Explanation:
When signals at different frequencies share the same transmission medium, the
result may be intermodulation noise. Signals at a frequency that is the sum or
difference of original frequencies or multiples of those frequencies will be
produced.
4. Which of these network
topologies have all the network nodes connected directly to each other?
[A] Bus
[B] Mesh
[C] Star
[D] Tree
Explanation:
Mesh topology is a point-to-point connection to other nodes or devices. All the
network nodes are directly connected to each other.
5. What do we call the
process of limiting bandwidth consumption by users?
[A] Bandwidth Shaping
[B] Downstreaming
[C] Net Neutrality
[D] Walling
Explanation:
Bandwidth Shaping refers to a tool used by ISPs to limit or direct bandwidth
consumption by users. Bandwidth shaping is also called bandwidth allocation or
referred to as a bandwidth management tool.
6. Which of the following
are the basic functions of a gateway?
[A] Protocol
Translation
[B] DHCP Service
[C] Network Address Translation
[D] All of the Above
Explanation:
A gateway performs many function. Some of them are Protocol translation,
network address translation and DHCP service. It is used to route the traffic
from one network to another and to connect LAN to WAN or VPN.
7. Which of the following
is an advantage of using Ring network topology?
[A] Troubleshooting is
easy
[B] Failure of one computer has no effect on others
[C] Network is not
affected by high traffic
[D] All of the above
Explanation:
In Ring topology, each computer is connected to another computer, with the last
one connected to the first. Exactly two neighbours are there for each device.
The advantage of using a Ring network topology is that the network is not
affected by high traffic.
8. Which of the following
techniques is used by UMTS?
[A] FDMA
[B] CDMA
[C] TDMA
[D] SDMA
Explanation:
UMTS uses wideband code division multiple access (W-CDMA) radio access
technology which offers greater spectral efficiency and bandwidth to mobile
network operators.
9. What is the maximum
download speed offered under LTE-Advanced standard?
[A] 10 Mbps
[B] 100 Mbps
[C] 1 Gbps
[D] 10 Gbps
Explanation:
The maximum download speed offered under LTE-Advanced standard is 1 Gbps. The
LTE advanced is the 10the version of LTE.
10. In which year ARPANET
was shut down?
[A] 1992
[B] 1990
[C] 1988
[D] 1984
Explanation:
The ARPANET, which was initially funded by the Advanced Research Projects
Agency (ARPA) of the United States Department of Defense, was shutdown and
dismantled in the year 1990.
11. Which of these network
protocol is used to synchronize the time of a server to another server?
[A] IGMP
[B] ARP
[C] NTP
[D] SSH
Explanation:
The Network Time Protocol is used to synchronize the time of a computer client
or server to another server or reference time source, such as a radio or
satellite receiver or modem.
12. Which was the final
version of Internet Explorer before it got discontinued?
[A] 9
[B] 10
[C] 11
[D] 12
Explanation:
Microsoft Internet Explorer version 11 was the eleventh and final version of
the browser. It was officially released in 2013 for Windows 8.1.
13. Which of the following
is an employment-oriented social media network?
[A] Viber
[B] Pinterest
[C] Linkedin
[D] Line
Explanation:
Linkedin is a business and employment-oriented service which is mainly used for
professional networking, including employers posting jobs and job seekers
posting their CVs.
14. Which of the following
is a famous social bookmarking website?
[A] Flickr
[B] Yelp
[C] Stumbleupon
[D] All of the above
Explanation:
Social bookmarking website is a site where users share other content from the
Internet and rate and comment on the content. Stumbleupon and Digg are some
examples.
15. Which of these
companies own the search engine Bing?
[A] Google
[B] Microsoft
[C] Amazon
[D] IBM
Explanation:
Microsoft launched Bing on June 1, 2009. On July 29, 2009, Yahoo! and Microsoft
agreed on a deal in which Yahoo! Search would be powered by Microsoft Bing
technology.
16. What is trigger used
for in MS PowerPoint?
[A] to start the
slideshow
[B] to end the slideshow
[C] initiate a
sequence of animations by clicking on a specific object
[D] to start random special effects when a particular key is pressed
Explanation:
Triggers allow users to initiate a sequence of animations by clicking on a
specific object on the slide rather than simply clicking your mouse.
17. How many number of characters
can be entered in a field name in MS Access 2010?
[A] 32
[B] 48
[C] 56
[D] 64
Explanation:
Number of characters in a field name in MS Access 2010 can be 64. Number of
fields in a table can be a maximum of 255.
18. What does OLE in MS Access stand for?
[A] Object Length
Extension
[B] Object Linking and
Embedding
[C] Object Load Estimate
[D] None of the above
Explanation:
OLE stands for Object Linking and Embedding. It is a proprietary technology
developed by Microsoft that allows embedding and linking to documents and other
objects.
19. Which protocol is used for fetching e-mail from a mailbox?
[A] FTP
[B] POP3
[C] HTTP
[D] IMAP
Explanation:
POP3 is a client/server protocol in which e-mail is received and held by the Internet server. Periodically, the mail-box is checked on the server and download any mail, probably using POP3.
20. Which of these is not
an email service provider?
[A] Yahoo
[B] Rediff
[C] WhatsApp
[D] Hotmail
Explanation:
Gmail, Yahoo, Rediff, Hotmail, Outlook are some of the email service providers.
WhatsApp is an instant messaging mobile application.
21. When was the first SMS sent?
[A] 1991
[B] 1992
[C] 1993
[D] 1994
Explanation:
The first-ever text message was sent December 3, 1992, by software engineer
Neil Papworth, to Vodafone director Richard Jarvis, who received the SMS on his
husky Orbitel 901 cell phone.
22. What do we call the
malicious computer programs that gains root or administrative access to the
computer?
[A] Antivirus
[B] Spamware
[C] Rootkits
[D] Backdoors
Explanation:
A rootkit is a clandestine computer program designed to provide continued
privileged access to a computer while actively hiding its presence.
23. Which of these is a
correct UPI virtual address?
[A] abc-sbi
[B] abc
[C] abc@sbi.com
[D] abc@sbi
Explanation:
Virtual Payment Address or VPA is a unique ID you need to create in order to
send and accept money via UPI.
24. Which of the following can work as access points in banking?
[A] ATMs
[B] Mobiles
[C] Computers
[D] All of above
Explanation:
Access points are places or capabilities that are used to initiate or receive a
payment. Access points can include bank branch offices, ATMs, terminals at the
POS, agent outlets, mobile phones, and computers.
25. Cloud Computing applications can be accessed by__?
[A] Special Protocols
given by Cloud Service Providers
[B] Common Internet
protocols and network standards
[C] Government
controlled Network standards
[D] Privately developed protocols and standards
Explanation:
Cloud Computing applications are accessed by common Internet protocols and networking standards.