1.
Which of the following is the most fault-tolerant WAN topology?
Correct Answer
B. Full-mesh
Explanation
A full-mesh WAN topology is considered the most fault-tolerant because it provides multiple connections between each network node. This redundancy ensures that if one connection fails, there are alternate paths available for data transmission. This makes the network more resilient to failures and ensures high availability. In contrast, partial-mesh, ring, and bus topologies have fewer connections or a single path, making them less fault-tolerant.
2.
Which type of cable are you most likely to find on networks that use bus topology?
Correct Answer
C. Coaxial cable
Explanation
In a bus topology network, all devices are connected to a single cable called the bus. Coaxial cable is most commonly used in bus topology networks due to its ability to transmit data over long distances without significant loss or interference. It is a thick, durable cable with a copper core surrounded by insulation, a metallic shield, and an outer jacket. The metallic shield helps to prevent signal interference and ensures reliable data transmission. Therefore, coaxial cable is the most suitable type of cable for networks that use bus topology.
3.
________ programs are automatically loaded and operates as a part of browser.
Correct Answer
C. Plug-ins
Explanation
Plug-ins are additional software programs that are automatically loaded and operate as a part of a browser. They enhance the functionality of the browser by adding new features or extending existing ones. Plug-ins are designed to seamlessly integrate with the browser and provide additional capabilities such as playing multimedia content, displaying interactive elements, or enhancing security. They are commonly used to enable specific types of content or functionality that may not be natively supported by the browser.
4.
Which item is an example of a physical network address?
Correct Answer
B. MAC address
Explanation
A MAC address, also known as a Media Access Control address, is a unique identifier assigned to a network interface controller (NIC) for communication on a physical network. It is a hardware address that is embedded in the network adapter at the time of manufacturing. Unlike an IP address, which is assigned by a network administrator and can change, a MAC address is permanent and cannot be altered. Therefore, a MAC address is a clear example of a physical network address.
5.
What is a LAN?
Correct Answer
C. Local Area Network
Explanation
A LAN stands for Local Area Network, which is a network that connects computers and devices within a limited area such as a home, office, or building. It allows for the sharing of resources such as files, printers, and internet connections among connected devices. LANs are typically faster and more secure than wide area networks (WANs) as they cover a smaller geographic area.
6.
A computer that requests the resources or data from other computer is called as ________ computer.
Correct Answer
B. Client
Explanation
A computer that requests resources or data from another computer is called a client. This is because a client computer relies on a server computer to provide it with the necessary resources or data. The server computer is responsible for fulfilling these requests and delivering the requested information to the client. Therefore, the correct answer is "Client."
7.
Which topology used in Ethernet?
Correct Answer
A. Bus
Explanation
Ethernet typically uses a bus topology. In a bus topology, all devices are connected to a single cable called the bus. Data is transmitted on the bus and received by all devices on the network. This allows for easy installation and scalability as devices can be added or removed without disrupting the network. However, a drawback of the bus topology is that if the bus cable fails, the entire network can be affected.
8.
A port address in TCP/IP is ………bits long.
Correct Answer
C. 16
Explanation
A port address in TCP/IP is 16 bits long. In TCP/IP, a port address is used to identify specific applications or services running on a device. It is a number between 0 and 65535. The 16-bit length allows for a total of 65,536 possible port addresses, which is sufficient to accommodate a wide range of applications and services on the internet.
9.
HTML stands for?
Correct Answer
A. Hyper Text Markup Language
Explanation
HTML stands for Hyper Text Markup Language. It is the standard markup language used for creating web pages and web applications. HTML uses tags to structure the content and define the layout of a webpage. These tags are interpreted by web browsers to display the content in a formatted manner. Therefore, the correct answer is "Hyper Text Markup Language".
10.
The attribute of tag
Correct Answer
C. Both (a)&(b)
Explanation
The correct answer is Both (a) and (b). This means that the attribute "method" can be used in both the "form" and "button" tags. The "method" attribute specifies the HTTP method to be used when submitting the form data. In the "form" tag, it defines the method for submitting the form, while in the "button" tag, it determines the type of HTTP request to be sent when the button is clicked.
11.
The correct HTML tag for the largest heading is
Correct Answer
D. <h1>
Explanation
The correct HTML tag for the largest heading is . This tag is used to define the most important heading on a webpage. It represents the highest level of heading and is typically used for the main title or heading of the page.
12.
Web pages start with which of the following tag?
Correct Answer
C. <HTML>
Explanation
The correct answer is "". Web pages start with the "" tag because it is the root element of an HTML document and defines the entire document. It is followed by the "" and "" tags, which contain the metadata and content of the web page respectively.
13.
Markup tags tell the web browser.
Correct Answer
B. How to display the page
Explanation
Markup tags tell the web browser how to display the page. These tags provide instructions to the browser on how to structure and format the content of the webpage. By using markup tags such as HTML, CSS, and JavaScript, web developers can define the layout, style, and functionality of the webpage, allowing the browser to render and display the page correctly to the user.
14.
Www is based on which model?
Correct Answer
B. Client-server
Explanation
The correct answer is client-server because the World Wide Web (www) is a network of servers that host websites and clients that access and view those websites. The client-server model is a distributed application structure where clients request resources or services from servers, and the servers provide those resources or services in response to the client's requests. In the case of the www, clients (web browsers) send requests to web servers to retrieve web pages and other resources. Therefore, the www is based on the client-server model.
15.
Correct HTML to left-align the content inside a table cell is
Correct Answer
C. <td align = "left">
Explanation
The correct HTML to left-align the content inside a table cell is . This attribute aligns the content within the table cell to the left side.
16.
In networking terminology UTP means
Correct Answer
A. Unshielded Twisted pair
Explanation
UTP stands for Unshielded Twisted Pair. This is a type of cable used in networking that consists of pairs of wires twisted together. The term "unshielded" means that the cable does not have any additional protective shielding around the wires. The twisting of the pairs helps to reduce electromagnetic interference and crosstalk between the wires, improving the overall performance of the cable. UTP cables are commonly used for Ethernet connections in both residential and commercial environments.
17.
Working of the WAN generally involves
Correct Answer
D. All of these
Explanation
The correct answer is "All of these" because the working of a Wide Area Network (WAN) typically involves the use of various communication technologies, including telephone lines, micro waves, and satellites. WANs are designed to connect geographically dispersed locations, and different technologies are used depending on the specific requirements and availability of infrastructure. Telephone lines are commonly used for wired connections, micro waves are used for wireless connections over short distances, and satellites are used for long-distance communication where terrestrial infrastructure is not available. Therefore, all of these options are correct in describing the working of a WAN.
18.
What uses a physical star topology?
Correct Answer
C. 10 base T
Explanation
10 base T uses a physical star topology. In 10 base T, each device is connected to a central hub or switch using individual twisted pair cables. This creates a star-shaped network where all devices are connected to a central point. This topology allows for easy scalability and troubleshooting as each device can be individually connected or disconnected without affecting the rest of the network.
19.
The software which allows a user to view the webpage is called __________.
Correct Answer
D. Internet Browser
Explanation
An internet browser is a software that enables users to view webpages. It is specifically designed to access and display information on the internet. It allows users to navigate through different websites, search for specific content, and interact with web-based applications. An internet browser acts as an interface between the user and the internet, making it possible to access and interact with various online resources.
20.
The process of keeping addresses in memory for future use is called
Correct Answer
C. Caching
Explanation
Caching is the process of storing data or addresses in memory for future use. It involves temporarily saving frequently accessed data or addresses in a cache, which allows for faster retrieval and processing times. This helps to improve overall system performance and reduce the need for repeated data retrieval from the original source. Therefore, caching is the correct answer for the given question.
21.
The server on the Internet is also known as a
Correct Answer
B. Host
Explanation
A server on the Internet is commonly referred to as a "host". A host is a computer or device that is connected to a network and provides services or resources to other devices or users on the network. It can store and serve web pages, handle email communication, manage databases, and perform various other functions. Therefore, the term "host" accurately describes a server's role in facilitating communication and providing services over the Internet.
22.
A user can get files from another computer on the Internet by using
Correct Answer
D. FTP
Explanation
FTP (File Transfer Protocol) is the correct answer because it is specifically designed for transferring files between computers on the Internet. FTP allows users to connect to a remote computer, browse its file system, and transfer files back and forth. HTTP (Hypertext Transfer Protocol) is primarily used for accessing and retrieving web pages, TELNET is used for remote login to another computer, and UTP (Unshielded Twisted Pair) is a type of network cable. Therefore, FTP is the most appropriate option for getting files from another computer on the Internet.
23.
The communication protocol used by Internet is:
Correct Answer
C. TCP/IP
Explanation
TCP/IP is the correct answer because it is the communication protocol used by the Internet. TCP (Transmission Control Protocol) is responsible for establishing reliable connections between devices, while IP (Internet Protocol) handles the addressing and routing of data packets across the network. Together, TCP/IP ensures that data can be transmitted and received accurately and efficiently over the Internet. HTTP, WWW, and FTP are all protocols that operate on top of TCP/IP, serving specific purposes such as web browsing and file transfer.
24.
The first network that planted the seeds of the Internet was:
Correct Answer
A. ARPANET
Explanation
ARPANET is the correct answer because it was the first network to lay the foundation for the Internet. Developed by the Advanced Research Projects Agency (ARPA) of the United States Department of Defense, ARPANET was established in the late 1960s and connected computers at various research institutions. It pioneered the use of packet switching technology and TCP/IP protocols, which are fundamental to the functioning of the modern Internet. NSFNet and Vnet were subsequent networks that played significant roles in the development of the Internet, but ARPANET was the initial network that started it all.
25.
Which of the following protocols is used for WWW?
Correct Answer
B. HTTP
Explanation
HTTP (Hypertext Transfer Protocol) is the correct answer because it is the protocol used for transmitting web pages and other web content over the internet. FTP (File Transfer Protocol) is a different protocol used for transferring files between computers, while W3 is not a protocol but rather refers to the World Wide Web Consortium (W3C), which develops web standards. Therefore, the correct protocol for the World Wide Web is HTTP.
26.
TCP is a commonly used protocol at
Correct Answer
B. Transport layer
Explanation
TCP (Transmission Control Protocol) is indeed a commonly used protocol at the Transport layer of the TCP/IP network model. The Transport layer is responsible for the reliable delivery of data between two endpoints in a network. TCP provides reliable, connection-oriented communication by establishing a connection between the sender and receiver, segmenting the data into smaller packets, ensuring their reliable delivery, and reassembling them at the receiving end. Therefore, TCP being a transport layer protocol is the correct answer.
27.
The first page that you normally view at a Website is its:
Correct Answer
A. Home Page
Explanation
The first page that you normally view at a website is its home page. The home page is the main page of a website that serves as an entry point for users. It typically contains an overview of the website's content, navigation menus, and links to other pages. The home page is designed to provide users with a clear understanding of what the website offers and helps them navigate to specific sections or pages of interest.
28.
Voice mail, E-mail, Online service, the Internet and the WWW are all example of
Correct Answer
C. Telecomputing
Explanation
Telecomputing refers to the use of computers and telecommunications technology to facilitate communication and information exchange. Voice mail, E-mail, Online service, the Internet, and the WWW all fall under this category as they utilize computers and telecommunications networks to enable communication and access to information. Therefore, the correct answer is Telecomputing.
29.
A small network making up the Internet and also having a small numbers of computers within it is called
Correct Answer
C. Subdomain
Explanation
A subdomain is a subset of a larger domain within the Domain Name System (DNS). It is used to organize and categorize websites or resources within a larger domain. In the context of the given question, a small network with a limited number of computers can be considered as a subdomain within the larger Internet domain. Therefore, the correct answer is "Subdomain".
30.
SMTP is a simple
Correct Answer
A. TCP protocol
Explanation
SMTP (Simple Mail Transfer Protocol) is a protocol used for sending email messages between servers. It is built on top of the TCP (Transmission Control Protocol) protocol, which provides reliable and ordered delivery of data packets over a network. TCP/IP (Transmission Control Protocol/Internet Protocol) is a suite of protocols that allows communication between devices on the internet. SMTP operates within the TCP/IP protocol suite, making the correct answer TCP protocol.
31.
A simple protocol used for fetching e-mail from a mailbox is
Correct Answer
B. POP3
Explanation
POP3 (Post Office Protocol version 3) is a simple protocol used for fetching e-mail from a mailbox. It allows users to access their email messages from a remote server and download them to their local devices. POP3 is widely supported by email clients and servers, making it a popular choice for retrieving emails. Unlike its predecessor POP2, which has limited functionality, POP3 offers more advanced features such as the ability to delete messages from the server after downloading. IMAP (Internet Message Access Protocol) is another protocol used for accessing email, but it is not the correct answer in this case. Therefore, the correct answer is POP3.
32.
Which protocol assigns IP address to the client connected in the internet?
Correct Answer
A. DHCP
Explanation
DHCP (Dynamic Host Configuration Protocol) is the correct answer because it is specifically designed to assign IP addresses to clients connected to the internet. DHCP allows for automatic and dynamic allocation of IP addresses, making it easier to manage and administer a network. With DHCP, clients can obtain an IP address, subnet mask, default gateway, and other network configuration information from a DHCP server, simplifying the process of connecting devices to the internet. IP, on the other hand, is the protocol responsible for routing packets across networks, while RPC (Remote Procedure Call) is a protocol used for communication between different processes on a network.
33.
Which one of the following is not used in media access control?
Correct Answer
D. None of the mentioned
Explanation
The question asks for the option that is not used in media access control. Media access control (MAC) refers to the protocols and mechanisms used to control access to the transmission media in a network. Ethernet, digital subscriber line (DSL), and fiber distributed data interface (FDDI) are all examples of technologies that use MAC protocols. Therefore, the correct answer is "none of the mentioned" as all the options listed are used in media access control.
34.
JPEG is a lossless compression technique.
Correct Answer
A. True
Explanation
JPEG is actually a lossy compression technique, not a lossless one. This means that when an image is compressed using JPEG, some of the original data is permanently discarded in order to reduce file size. This loss of data can result in a decrease in image quality, particularly in areas with fine details or subtle color variations. Therefore, the correct answer should be False, not True.
35.
The two main file formats for images on the Web GIF and TIF
Correct Answer
B. False
Explanation
The statement is false because the two main file formats for images on the web are actually JPEG (Joint Photographic Experts Group) and PNG (Portable Network Graphics). While GIF (Graphics Interchange Format) and TIF (Tagged Image File Format) are commonly used for images, they are not the primary formats for web images. JPEG is widely used for photographs and complex images, while PNG is preferred for images with transparent backgrounds or sharp edges.
36.
Software that may be used to help you locate web pages on topics that you do not know the address for is called search engines.
Correct Answer
A. True
Explanation
Search engines are software tools that help users locate web pages on topics they do not know the address for. These search engines use algorithms to search through vast amounts of data and provide users with relevant results based on their search queries. By entering keywords or phrases, users can find web pages and information related to their interests or needs. Therefore, the given statement is true.
37.
SMTP is associated with E-Mail.
Correct Answer
A. True
Explanation
SMTP (Simple Mail Transfer Protocol) is a communication protocol used for sending and receiving email messages between servers. It is responsible for the transmission of emails from the sender's email client to the recipient's email server. Therefore, SMTP is indeed associated with email, making the given answer "True" correct.
38.
E-mail is limited to text-based messages.
Correct Answer
B. False
Explanation
E-mail is not limited to text-based messages. It can also include attachments such as images, documents, and videos. This allows users to send a wide range of content through email, making it a versatile communication tool.
39.
The two parts of the e-mail address are separated by the @ symbol.
Correct Answer
A. True
Explanation
The @ symbol is used to separate the two parts of an email address. The part before the @ symbol is the username or the local-part, which identifies the specific user of the email address. The part after the @ symbol is the domain name, which specifies the mail server that handles the email for that address. Therefore, the statement is true.
40.
CSMA/CD access method is used in Bus Topology.
Correct Answer
A. True
Explanation
CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is an access method used in Ethernet networks, where multiple devices share the same physical medium, such as a bus topology. In CSMA/CD, devices listen to the network before transmitting data and if they detect a collision, they stop transmitting and wait for a random amount of time before retrying. This method helps to avoid data collisions and ensure efficient sharing of the network medium. Therefore, the statement that CSMA/CD access method is used in Bus Topology is true.
41.
Copyright law grants the exclusive right to copyright holders in relation to their work.
Correct Answer
A. True
Explanation
Copyright law does indeed grant exclusive rights to copyright holders in relation to their work. These exclusive rights include the right to reproduce, distribute, display, perform, and create derivative works based on the original work. This means that only the copyright holder has the legal authority to exercise these rights and others must seek permission or a license to use the copyrighted work. Therefore, the statement "True" is the correct answer.
42.
Java and Javascript both are same thing.
Correct Answer
B. False
Explanation
Java and Javascript are not the same thing. Although they share similar names, they are completely different programming languages with different syntax, use cases, and purposes. Java is a general-purpose programming language that is widely used for developing applications, while Javascript is a scripting language primarily used for web development. While they may have some similarities in terms of syntax, they are distinct and separate languages.
43.
JavaScript is a client-side program.
Correct Answer
A. True
Explanation
JavaScript is indeed a client-side programming language. It is primarily executed on the client's web browser, allowing for dynamic and interactive elements on webpages. This means that JavaScript code is downloaded from the server and executed on the client-side, rather than on the server itself. This allows for enhanced user experience and interactivity on websites.
44.
<Caption> tag is used to define the column heading.
Correct Answer
B. False
Explanation
The given statement is false. The tag is not used to define the column heading. Instead, it is used to define a caption or title for a table. The column headings in a table are typically defined using the (table header) tags within the (table row) tags.
45.
JPG images support only 256 colors.
Correct Answer
B. False
Explanation
JPG images do not support only 256 colors. In fact, JPG is a lossy compression format that can support millions of colors. It achieves compression by reducing the quality of the image, but it does not limit the number of colors that can be displayed. Therefore, the statement is false.
46.
Addresses contained in CC are visible to all the recipients of mail.
Correct Answer
A. True
Explanation
When an email is sent with recipients included in the CC (Carbon Copy) field, all the recipients can see the email addresses of everyone else who received the email. This means that the addresses in the CC field are visible to all the recipients. Therefore, the statement "Addresses contained in CC are visible to all the recipients of mail" is true.
47.
IRC is a service that runs on the Internet.
Correct Answer
A. True
Explanation
IRC stands for Internet Relay Chat, which is a service that allows users to communicate with each other in real-time through text-based messages. It operates on the Internet, providing a platform for individuals to join chat rooms or engage in private conversations. Therefore, the given statement that IRC is a service that runs on the Internet is correct.
48.
A router uses a table to decide the best path for data transmission.
Correct Answer
B. False
Explanation
A router does use a table, known as a routing table, to decide the best path for data transmission. However, the statement in the question is incorrect as it states that a router uses the table to decide the best path for data transmission. In reality, a router uses the routing table to determine the next hop for data packets based on their destination IP addresses. The routing table contains information about various network destinations and the associated next hops. So, the correct answer is False.
49.
Collaborative computing facilitates the working of people together via computer assisted means
Correct Answer
A. True
Explanation
Collaborative computing refers to the use of computer technology to enable people to work together on a task or project. It provides tools and platforms that allow individuals to collaborate, share information, and work collectively towards a common goal. By leveraging computer-assisted means, such as shared documents, real-time communication, and virtual meetings, collaborative computing enhances productivity and enables seamless collaboration regardless of physical location. Therefore, the statement is true as it accurately describes the purpose and benefits of collaborative computing.
50.
ARPANET was a project of DOD
Correct Answer
A. True
Explanation
ARPANET was indeed a project of the Department of Defense (DoD). It was the first-ever packet-switching network and was developed by the Advanced Research Projects Agency (ARPA) under the DoD. The purpose of ARPANET was to create a decentralized network that could withstand a nuclear attack and maintain communication between military installations. It laid the foundation for the modern internet and played a crucial role in the development of networking technologies.