You are on page 1of 20

STUDY NOTES FOR ALL COMPETATIVE EXAM

Write us : content@mahendras.org www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETATIVE EXAM

DATA BASE QUESTIONS (DATA BASE)

Basic Terms- Q.1. Database utility exist in ——————


Data : The smallest piece of data that can be menu ?
“recognized” by the computer is a single character (1) Format
Field : A character or group of characters (2) tools
(alphabetic or numeric) that has a specific meaning.
(3) File
Record : A logically connected set of one or more
fields that describes a person, place, or thing. (4) Edit
(5) None of these
File : A collection of records.
Q.2. In which object sql is used ?
What is DBMS-
(1) Query
Contains information about a particular enterprise
(2) Form
Collection of interrelated data (3) Report
Set of programs to access the data (4) Macro
An environment that is both convenient and (5) None of these
efficient to use What is the function of relationship ?
Q.3.
Database Applications- (1) Relate multiple table
Banking : all transactions (2) Relate multiple form
Airlines : reservations, schedules (3) Relate table and form
Universities : registration, grades (4) Relate queries and forms
Sales : products, purchase (5) None of these
Q.4. What is there in record ?
Online retailers : order tracking
(1) Collection of field
Manufacturing : production, inventory
(2) collection of Number
Types of Databases-
(3) Collection of rows
PC Database (4) All of above
Centralized Database (5) None of these
Distributed Database Q.5. Which operation is not permitted by query?
Levels of DBMS- (1) delete
Physical level: (2) entry
Describes how a record (e.g., customer) is stored. (3) Modify
(4) create table
Logical level:
(5) None of these
Describes data stored in database, and the
relationships among the data. Q.6. Which is not related to database ?
(1) Table
View level:
(2) Query
Application programs hide details of data types.
(3) Form

Write us : content@mahendras.org www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETATIVE EXAM

(4) Macro Q.12. Which of the following is NOT a type of


(5) None of these Microsoft Access database object?
Q.7. The language used by application (1) Queries
programs to request data from the DBMS (2) Workbooks
is referred to the- (3) Forms
(1) DML (4) Tables
(2) DDL (5) None of these
(3) query language Q.13. The complete picture of data stored in
(4) All of the above database is known as
(5) None of these (1) System flowchart
Q.8. COMMIT and ROLLBACK in DBMS are (2) Schema
the example of - (3) record
(1) DDL (4) DBMS
(2) DML (5) None of these
(3) TQL Q.14. A subset of characters within a data field is
(4) DQL known as
(5) None of these (1) Record
Q.9. In Data base , properties of any entity are (2) File
represented by its - (3) Data string
(1) Setting (4) Byte
(2) Tuples (5) None of these
(3) Attributes Q.15. Data items grouped together for storage
(4) Degree purposes are called-
(5) None of these (1) Record
Q.10. Type of a file is identified by - (2) Title
(1) File (3) List
(2) Attribute (4) string
(3) Extension (5) None of these
(4) Properties Q.16. Which of the following terms does not
(5) None of these describe a database structure used by a
Q.11. Which of the following is a type of DBMS DBMS to link data from several files?
Software? (1) Relational
(1) Data (2) Structural
(2) My SQL (3) Network
(3) MS-office (4) All of the above
(4) utility (5) None of these
(5) None of these

Write us : content@mahendras.org www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETATIVE EXAM

Q.17. The feature that database allows to access (3) Rename


only certain records in database is: (4) Union
(1) Forms (5) None of these
(2) Reports Q.23. Which of the following is not binary
(3) Queries operation?
(4) Tables (1) Union
(5) None of these (2) Project
Q.18. Set of permitted values of each attribute is (3) Set Difference
called ______. (4) Cartesian Product
(1) Domain (5) None of these
(2) Relation (3) Tuple Q.24. The raw facts and figures are:
(4) Schema (1) Program
(5) None of these (2) Information
Q.19. The primary key must be ____. (3) Snapshot
(1) Unique (4) Reports
(2) Not null (5) None of these
(3) Both 1 and 2 Q.25. A command to remove a relation from an
(4) Either 1 or 2 SQL database is ____.
(5) None of these (1) Delete table <table name>
Q.20. Logical design of the database is called (2) Drop table <table name>
______. (3) Erase table <table name>
(1) Database Snapshot (4) Alter table <table name>
(2) Database Instance (5) None of these
(3) Database Schema Q.26. Entities having primary key are called?
(4) All of the above (1) Primary Entities
(5) None of these (2) Strong Entities
Q.21. Snapshot of the data in the database at a (3) Weak Entities
given instant of time is called _____. (4) Primary Key
(1) Database Schema (5) None of these
(2) Database Instance Q.27. In the E-R diagrams, the term cardinality is
(3) Database Snapshot a synonym for the term?
(4) All of the above (1) Attribute
(5) None of these (2) Degree
Q.22. Which of the following is not Unary (3) Entities
operation? (4) Cartesian
(1) Select (5) None of these
(2) Project Q.28. TRUNCATE statement in SQL is a ____.

Write us : content@mahendras.org www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETATIVE EXAM

(1) DML statement (3) Each sub schema contains every field
(2) DDL statement in the logical schema
(3) DCL statement (4) All of above
(4) TCL statement (5) None of above
(5) None of above Q.34. It is better to use files than a DBMS when
Q.29. The default date format in SQL is? there are _______ .
(1) DD-MON-YY (1) Stringent real-time requirements
(2) DD-MM-YY (2) Multiple users who wish to access the
data
(3) DD-MM-YYY
(3) Complex relationships among data
(4) DD-MM-YYYY
(4) All of the above
(5) None of these
(5) None of these
Q.30. For adding number of hours to a date,
which of the following statement is used ? Q.35. The conceptual model is _______ .

(1) Date + Number (1) dependent on hardware


(2) dependent on software
(2) Date + Number/24
(3) dependent on both hardware and
(3) Date+Number of Hours
software
(4) Date +Hour/30
(4) independent of both hardware and
(5) None of above
software
Q.31. A data dictionary is a special file that
(5) None of these
contains?
Q.36. What is a relationship called when it is
(1) the data types of all fields in all files
maintained between two entities?
(2) the names of all fields in all files
(1) Unary
(3) the widths of all fields in all files
(2) Binary
(4) All of above
(3) Ternary
(5) None of above
(4) Quaternary
Q.32. A command that lets you change one or
(5) 1 and 2
more fields of a record is?
Q.37. Which of the following operation is used if
(1) Insert
we are interested in only certain columns
(2) Modify of a table?
(3) Look-up (1) PROJECTION
(4) All of above (2) SELECTION
(5) None of above (3) UNION
Q.33. In a large DBMS? (4) JOIN
(1) Each user can see only a small part of (5) Intersect
the entire database
Q.38. Which of the following is a valid SQL
(2) Each user can access every sub schema type?
(1) CHARACTER
Write us : content@mahendras.org www.mahendras.org www.mahendraguru.com myshop.mahendras.org
STUDY NOTES FOR ALL COMPETATIVE EXAM

(2) NUMERIC (4) Conceptual


(3) FLOAT (5) None of these
(4) DATE Q.44. Which are the two ways in which entities
(5) All of the above can participate in a relationship?
Q.39. The RDBMS terminology for a row is (1) Passive and active
_______? (2) Total and partial
(1) Tuple (3) Simple and Complex
(2) Relation (4) All of the above
(3) Attribute (5) None of these
(4) Degree Q.45. The result of the UNION operation
(5) Field between R1 and R2 is a relation that
Q.40. Which of the following operations need the includes _______.
participating relations to be union (1) All the tuples of R1
compatible? (2) All the tuples of R2
(1) UNION (3) All the tuples of R1 and R2
(2) INTERSECTION0 (4) All the tuples of R1 and R2 which have
(3) DIFFERENC common columns
(4) All of the above (5) None of these
(5) None of these Q.46. Which of the following option appropriate
Q.41. The full form of DDL is _______? is a comparison operator in SQL?
(1) Dynamic Data Language (1) =
(2) Detailed Data Language (2) LIKE
(3) Data Definition Language (3) BETWEEN
(4) Data Derivation Language (4) All of the above
(5) Data Dimensional Language (5) None of these
Q.42. Which of the following is an advantage of Q.47. ________ is a process when relation
a View? between two entity is treated as a single
entity.
(1) Data security
(1) Normalization
(2) Derived columns
(2) Aggregation
(3) Hiding of complex queries
(3) Generalization
(4) All of the above
(4) Specialization
(5) None of these
(5) Simplification
Q.43. Which database level is closest to the
users? Q.48. In an ER Diagram, ellipse with underlying
lines is used to represent _________?
(1) External
(1) attribute
(2) Internal
(2) Key attribute
(3) Physical

Write us : content@mahendras.org www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETATIVE EXAM

(3) Composite attribute (4) Not Null


(4) Multivalued attribute (5) Unique
(5) Entity Q.50. In a table of data base, degree refers
Q.49. _________ constraint is used to restrict (1) total numer of row
actions that would destroy links between
(2) row in a table
tables?
(1) Primary key (3) column in a table

(2) Foreign Key (4) total number of column in a table


(3) Check (5) none of these

Write us : content@mahendras.org www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETATIVE EXAM

ANSWERS Q.31.(4) the data types of all fields in all files,


Tools the names of all fields in all files and
Q.1.(2)
Query the widths of all fields in all files
Q.2.(1)
Relate Multiple Table Q.32.(2) Modify
Q.3.(1)
Collection of field Q.33.(1) Each user can see only a small part of
Q.4.(1)
Entry the entire database.
Q.5.(2)
Form Q.34.(2) Multiple users who wish to access the
Q.6.(3)
DML data
Q.7.(1)
TQL (Transaction Query Language) Q.35.(4) Independent of both hardware and
Q.8.(3)
Attributes sofware.
Q.9.(3)
Extension Q.36.(2) Binary
Q.10.(3)
My SQL Q.37.(1) PROJECTION operation is used if we
Q.11.(2)
Workbooks are interested in only certain columns
Q.12.(2)
Schema of a table.
Q.13.(2)
Q.14.(3) Data string Q.38.(5) All are valid SQL data type.
Q.15.(1) Record Q.39.(1) The RDBMS terminology for a row is
Structural Tuple.
Q.16.(2)
Queries Q.40.(4) Union, Intersection and difference
Q.17.(3)
Domain Q.41.(3) DDL stands for Data Definition
Q.18.(1)
Primary key must satisfy unique and Language.
Q.19.(3)
not null condition for sure. Q.42.(4) All are advantages of view.
Logical design of database is called Q.43.(1) External database level is closest to the
Q.20.(3)
Database Schema. users.
Snapshot of the data in the database at Q.44.(2) Total and partial.
Q.21.(2)
a given instant of time is called Q.45.(4) All the tuples of R1 and R2 which have
Database Instance. common columns.
Q.22.(4) Union is not Unary operation. Q.46.(4) =, Like and Between are comparison
Project is not binary operation. operators in SQL.
Q.23.(5)
None of these Q.47.(2) Aggregation is a process when relation
Q.24.(5)
Drop table <table name> between two entities is treated as a
Q.25.(2)
Strong Entities single entity.
Q.26.(2)
Cartesian Q.48.(2) In an ER Diagram, ellipse with
Q.27.(4)
TRUNCATE statement in SQL underlying lines is used to represent
Q.28.(2)
removes all records from table, Key attribute.
including all spaces allocated for the Q.49.(2) Foreign Key constraint is used to restrict
records are removed. actions that would destroy links between
The default date format in SQL is DD- tables.
Q.29.(4)
MM-YYYY. Q.50.(4) Total mumber of column in a table.
Q.30.(2) Date + Number/24

Write us : content@mahendras.org www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETATIVE EXAM

NETWORKING 1. Message: It is the information or data to be


communicated. It can consist of text, numbers,
Networking pictures, sound or video or any combination of
Data communication refers to the exchange of these.
data between a source and a receiver. Data 2. Sender: It is the device/computer that generates
communication is said to be local if and sends that message.
communicating devices are in the same building 3. Receiver: It is the device or computer that
or a similarly restricted geographical area.The receives the message. The location of receiver
meanings of source and receiver are very simple. computer is generally different from the sender
The device that transmits the data is known as computer. The distance between sender and
source and the device that receives the receiver depends upon the types of network used
transmitted data is known as receiver. Data in between.
communication aims at the transfer of data and
4. Medium: It is the channel or physical path
maintenance of the data during the process but
through which the message is carried from
not the actual generation of the information at
sender to the receiver. The medium can be wired
the source and receiver.
like twisted pair wire, coaxial cable, fiber-optic
Simple data communication system cable or wireless like laser, radio waves, and
A data communication system may collect data microwaves.
from remote locations through data transmission 5. Protocol: It is a set of rules that govern the
circuits, and then outputs processed results to communication between the devices. Both
remote locations. Figure provides a broader sender and receiver follow same protocols to
view of data communication networks. The communicate with each other.
different data communication techniques which
Transmission Media
are presently in widespread use evolved
When choosing the transmission media, what
gradually either to improve the data
are the factors to be considered?
communication techniques already existing or to
replace the same with better options and Transmission Rate
features. Then, there are data communication Distances
jargons to contend with such as baud rate, Cost and Ease of Installation
modems, routers, LAN, WAN, TCP/IP, ISDN, Resistance to Environmental Conditions
during the selection of communication systems. There are two types of transmission media:
Hence, it becomes necessary to review and 1. Guided
understand these terms and gradual
2. Unguided
development of data communication methods.
Guided Media :
Data Communication System Using Remote
Unshielded Twisted Pair (UTP)
Location
Shielded Twisted Pair
Components of data communication system
Coaxial Cable
A Communication system has following
components: Optical Fiber

Write us : content@mahendras.org www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETATIVE EXAM

Twisted Pair Cable and at the other end light detector detects light
A twisted pair cable is made of two plastic stream and converts it to electric data.
insulated copper wires twisted together to form Unguided Media:
a single media. Out of these two wires, only one Transmission media then looking at analysis of
carries actual signal and another is used for using them unguided transmission media is data
ground reference. The twists between wires are signals that flow through the air. They are not
helpful in reducing noise (electro-magnetic guided or bound to a channel to follow.
interference) and crosstalk. Following are unguided media used for data
There are two types of twisted pair cables: communication:
Shielded Twisted Pair (STP) Cable Radio Transmission
Unshielded Twisted Pair (UTP) Cable Microwave
STP cables comes with twisted wire pair Satellite Communication
covered in metal foil. This makes it more Satellite :
indifferent to noise and crosstalk. Satellites are transponders (units that receive on
UTP has seven categories, each suitable for one frequency and retransmit on another) that are
specific use. In computer networks, Cat-5, Cat- set in geostationary orbits directly over the
5e, and Cat-6 cables are mostly used. UTP equator. These geostationary orbits are 36,000 km
cables are connected by RJ45 connectors. from the Earth's surface. At this point, the
Coaxial Cable gravitational pull of the Earth and the centrifugal
Coaxial cable has two wires of copper. The core force of Earth's rotation are balanced and cancel
wire lies in the center and it is made of solid each other out. Centrifugal force is the rotational
conductor. The core is enclosed in an insulating force placed on the satellite that wants to fling it
sheath. The second wire is wrapped around over out into space.
the sheath and that too in turn encased by Microwave :
insulator sheath. This all is covered by plastic Microwave transmission is line of sight
cover. transmission. The transmit station must be in visible
Fiber Optics contact with the receive station. This sets a limit on
the distance between stations depending on the local
Fiber Optic works on the properties of light.
geography. Typically the line of sight due to the
When light ray hits at critical angle it tends to
Earth's curvature is only 50 km to the horizon!
refracts at 90 degree. This property has been Repeater stations must be placed so the data signal
used in fiber optic. The core of fiber optic cable can hop, skip and jump across the country.
is made of high quality glass or plastic. From
one end of it light is emitted, it travels through it

Write us : content@mahendras.org www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETATIVE EXAM

QUESTIONS (NETWORKING) Q.6. The loss in signal power as light travels


down the fiber is called
Q.1. In OSI network architecture, the routing is (1) Attenuation
performed by ............. ?
(2) Interruption
(1) Network layer
(3) Scattering
(2) Data link layer
(4) Propogation
(3) Transport layer
(5) None of these
(4) Session layer
Q.7. Device that connect to the network without
(5) None of these using cables is called———.
Q.2. Which of the following performs (1) Distributed
modulation and demodulation ?
(2) Wireless
(1) Fiber optics
(3) Centralized
(2) Satellite
(4) Open source
(3) Coaxial Cable
(5) None of these
(4) Encoder/Decoder
Q.8. The most important and powerful computer
(5) None of these are typically____.
Q.3. Which is the first layer of OSI model- (1) Desktop
(1) Physical layer (2) Network client
(2) Link layer (3) Network server
(3) Transport layer (4) Networkstation
(4) Network layer (5) Super computer
(5) None of these Q.9. Example of connectivity is_______
Q.4. Which of the following is not a transmission (1) Internet
medium ?
(2) Floppy disk
(1) Telephones lines
(3) Powercord
(2) Coaxial cables
(4) Data
(3) Modem
(5) None of these
(4) Micro wave system
Q.10. Which of the following has highest complex
(5) None of these interconnection ?
Q.5. What is the minimum number of wires (1) Bus
needed to send data over a serial
(2) Ring
communication link layer ?
(3) Star
(1) 1
(4) Mesh
(2) 2
(5) None of these
(3) 4
Q.11. Netware is a product of which company ?
(4) 6
(1) Microsoft
(5) None of these
(2) Redhat

Write us : content@mahendras.org www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETATIVE EXAM

(3) Novell (5) None of these


(4) Window Q.17. Which of the following is an invalid IP
(5) None of these Address -
Q.12. Network which is connected over a (1) 10. 226. 0. 15
Geographic area is called - (2) 192. 168. 0.12
(1) LAN (3) 10. 265. 0 .115
(2) MAN (4) 192. 168. 0. 1
(3) WAN (5) None of these
(4) CAN Q.18. CBS is the example of -
(5) None of these (1) LAN
Q.13. Which device is used to connect a computer (2) WAN
over the Telephone Network. (3) Internet
(1) Router (4) Intranet
(2) Hub (5) None of these
(3) VSAT Q.19. Which layer of OSI Model is closest to the
(4) Gateway user -
(5) None of these (1) Physcial layer
Q.14. What is the function of network (2) Transport layer
neighbourhood ? (3) Application layer
(1) To navigate shared computer and (4) Network layer
folder in Network (5) None of these
(2) To identify who is living near to you Q.20. Which of the following is considered as a
(3) Send messages to neighbouring broad band communications channel?
computer (1) co-axial cable
(4) Both 1 & 2 (2) fiber optic cable
(5) None of these (3) microwave circuits
Q.15. Which device can not be shared in Network? (4) satellite systems
(1) Computer (5) All of the above
(2) Keyboard Q.21. Which one of the following is used as
(3) Floppy connect to the internet?
(4) Printer (1) Web browser
(5) None of these (2) Net fitter
Q.16. Work group means ? (3) Windows 95
(1) Computer in Network (4) Cable
(2) Individual user (5) None of these
(3) Individual deposit
(4) All of above

Write us : content@mahendras.org www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETATIVE EXAM

Q.22. Which of the following communication (3) Dial-up


mode support two way traffic but only in one (4) Satellite
direction at a time? (5) None of these
(1) Simplex Q.28. Which of the following is not an example of
(2) half-duplex security and privacy risk ?
(3) three-quaters duplex (1) Hackers
(4) All of the Above (2) Spam
(5) None of these (3) Virus
Q.23. Who decide about the division of work with (4) Identity theft
respect to IT security ? (5) None of these
(1) Data owner Q.29. A ____________ uses long-distance
(2) Senior Manager transmission media to link computers
(3) Data Custodian separated by distance.
(4) Data user (1) circuit-switching network
(5) None of these (2) Wi-Fi
Q.24. The user account can only be created by the (3) WAN
(1) User (4) LAN
(2) Network administrator (5) None of these
(3) Security administrator Q.30. Which of the following is NOT considered
(4) Project incharge as a network communications device?
(5) None of these (1) Network interface card (NIC)
Q.25. Digital signal used in ISDN have - (2) Modem
(1) Discrete value (3) Data bus
(2) Any value (4) Router
(3) whole no value (5) None of these
(4) fractional value Q.31. Which one is a valid IP address?
(5) None of these (1) 300.215.317.3
Q.26. Bandwidth means - (2) 302.215.417.5
(1) Channel capacity (3) 202.50.20.148
(2) Data transmission (4) 202-5-20-148
(3) Cable lengt (5) None of these
(4) All Q.32. Which type of transmission media is known
(5) None of these as regular telephone wire?
Q.27. Which of the following is NOT a type of (1) Wi-Fi
broadband Internet connection? (2) Twisted-pair wire
(1) Cable (3) Fiber optic cable
(2) DSL (4) Coaxial cable

Write us : content@mahendras.org www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETATIVE EXAM

(5) All Q.38. Which topology requires a multipoint


Q.33. What is the purpose of a firewall on a connection?
computer? (1) Mesh
(1) To protect a computer from unauthorized (2) Star
access (3) Bus
(2) To protect a computer in case of fire (4) Ring
(3) To protect a computer from spam (5) Tree
(4) All of the above Q.39. Which of the following refers to a small,
(5) None of these single-site network?
Q.34. Which of the following layer is not in OSI (1) LAN
model? (2) DSL
(1) Physical layer (3) RAM
(2) Internet layer (4) USB
(3) Network layer (5) CPU
(4) Transport layer Q.40. Computers connected to a LAN (Local Area
(5) Application layer Network) can—
Q.35. Copper wire is an example of? (1) Run faster
(1) Guided Transmission Media (2) Go on line
(2) Shield Media (3) Share information and/or share
(3) Group Media peripheral equipment
(4) Unguided Transmission Media (4) E-mail
(5) None of these (5) None of these
Q.36. An unauthorized user is a network _______ Q.41. A communication processor that connects
issue. dissimilar networks by providing the
(1) Performance translation from one set of protocol to
another is—
(2) Reliability
(1) Modem
(3) Security
(2) Gateway
(4) Firewall
(3) Router
(5) None of these
(4) Bridge
Q.37. Which topology requires a central controller
or hub? (5) All of these

(1) Mesh Q.42. A group of computers and other devices


connected together is called________.
(2) Star
(1) Network
(3) Bus
(2) Intranet
(4) Ring
(3) Internetworking
(5) Tree

Write us : content@mahendras.org www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETATIVE EXAM

(4) Both 2 and 3 Q.48. What is a stub network?


(5) Extranet (1) A network that has only one entry and
Q.43. Transmission Lines are also called exit point.
as________. (2) A network with only one entry and no
(1) Circuits exit point.
(2) Channels (3) A network with more than one exit
(3) Trunks point.
(4) Circuits channels, or trunks (4) A network with more than one exit and
(5) Wire entry point.

Q.44. The Switching Elements are also called as (5) A network with more than one entry
_____. point.
(1) Host Q.49. Which of the following services use TCP?
(2) Terminal (1) DHCP
(3) Interface Message Processors (IMPs) (2) SMTP
(4) Both 1 and 2 (3) FTP
(5) Subnet (4) HTTP
Q.45. The distance a simple signal can travel in (5) 2, 3 and 4
one period is called ________. Q.50. Which of the following terms is used to
(1) Wavelength describe a hardware- or software-based
device that protects networks from outside
(2) Frequency
threats?
(3) Propagation speed
(1) NIC
(4) Both 1 and 2
(2) Gateway
(5) None of these
(3) Firewall
Q.46. How many collision domains are created
when you segment a network with a 12-port (4) Hub
switch? (5) Server
(1) 1 Q.51. Which class of IP address provides a
(2) 12 maximum of only 254 host addresses per
network ID?
(3) 5
(1) Class E
(4) 2
(2) Class B
(5) 10 12
(3) Class C
Q.47. Which protocol does Ping use?
(4) Class D
(1) TCP
(2) ARP (5) Class A

(3) ICMP Q.52. Which of the following devices translates


hostnames into IP addresses?
(4) BootP
(1) DNS Server
(5) UDP

Write us : content@mahendras.org www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETATIVE EXAM

(2) Hub (4) NIC


(3) DHCP Server (5) Switch
(4) Firewall Q.57. Switch is a device of _________ Layer of
(5) MAC OSI Model.
Q.53. Which of the following devices takes data (1) Network Layer
sent from one network device and forwards (2) Data Link Layer
it to all devices on the network regardless of (3) Application Layer
the intended recipient? (4) Session Layer
(1) Switch (5) None of these
(2) DNS Server Q.58. HUB is a _________ Device and Switch is
(3) Hub a ________ Device.
(4) Gateway (1) Unicast, Multicast
(5) All (2) Multicast, Unicast
Q.54. Which of the following devices takes data (3) Broadcast, Unicast
sent from one network device and forwards (4) Unicast, Unicast
it to the destination node based on MAC
(5) Multicast, Multicast
address?
Q.59. Star Topology is based on a Central Device
(1) Hub
that can be __________.
(2) Switch
(1) HUB
(3) Gateway
(2) Switch
(4) Modem
(3) Router
(5) All
(4) Both 1 and 2
Q.55. Which of the following devices is used to
(5) Gateway
connect same network segments and
manage the traffic between them? Q.60. Which of the following devices modulates
digital signals into analog signals that can be
(1) Switch
sent over traditional telephone lines?
(2) Hub
(1) Router
(3) Modem
(2) Gateway
(4) Repeater
(3) Switch
(5) Bridge
(4) Modem
Q.56. Which of the following network
(5) NIC
devices/systems translates data from one
format to another? Q.61. Computer systems that transmit data over
communications lines, such as telephone
(1) DHCP Server
lines or cables are called______.
(2) Hub
(1) home-based systems
(3) Gateway
(2) centralized data systems

Write us : content@mahendras.org www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETATIVE EXAM

(3) data networks (1) local area network (LAN)


(4) data communications systems (2) metropolitan area network (MAN)
(5) Wi-Fi system (3) wide area network (WAN)
Q.62. ________ method places all processing, (4) plain old telephone service (POTS)
hardware, and software in one central (5) None of these
location. Q.67. A network of geographically distant
(1) Wide area data processing computers and terminals is called a:
(2) Network data processing (1) Integrated Services Digital Network
(3) Centralized data processing (ISDN)
(4) Distributed data processing (2) local area network (LAN)
(5) None of these (3) metropolitan area network (MAN)
Q.63. _________ processing method allows both (4) wide area network (WAN)
remote access and remote processing. (5) All of the above
(1) Analog transmission Q.68. In this network arrangement, all computers
(2) Centralized data processing have equal status.
(3) Distributed data processing (1) Client/server
(4) Digital transmission (2) Client-to-client
(5) Hierarchy processing (3) Peer-to-peer
Q.64. A computer system that uses (4) Token ring
communications equipment to connect two (5) Server/ Terminal
or more computers and their resources is a Q.69. The most common communications devices
__________. all use __________ transmission, a
(1) network continuous electrical signal in the form of a
(2) hub wave.
(3) bridge (1) analog
(4) router (2) digital
(5) firewall (3) automatic
Q.65. The protocol that makes Internet (4) all
universality possible is _________. (5) None of these
(1) FEP Q.70. A (n) __________ adapter can move data at
(2) WAN 128,000 bps, more than double a standard
modem
(3) POTS
(1) Fax
(4) TCP/IP
(2) Dial-Up
(5) MAN
(3) Telephone modem
Q.66. A network of personal computers that share
(4) ISDN
hardware, software, and data is called a
(5) None of these
________.

Write us : content@mahendras.org www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETATIVE EXAM

ANSWERS Q.26.(4) Bandwidth is the amount of data that


can be transmitted along a channel
Q.1.(1) Network layer during a specified period of time.
Q.2.(5) None of these Q.27.(3) Dial-up
Q.3.(1) Physical layer Q.28.(2) Spam
Q.4.(3) Modem Q.29.(3) A WAN uses long - distance
Q.5.(2) 2 transmission media to link computers
Q.6.(1) Attenuation separated by distance.
Q.7.(2) Wireless Q.30.(3) Data Bus is NOT considered a network
Q.8.(5) Super computer communications device.
Q.9.(1) Internet is example of connectivity. Q.31.(3) 202.50.20.148
Q.10.(4) Mesh Q.32.(2) Twisted-pair wire of transmission
media is known as regular telephone
Q.11.(3) Netware is an operating system, which
wire.
is developed by Novell.
Q.33.(1) To protect a computer from
Q.12.(3) WAN
unauthorized access
Q.13.(5) None of these
Q.34.(2) Internet layer
To connect a computer over telephone
Q.35.(1) Guided Transmission Media
line, modem is required.
Q.36.(3) Security
Q.14.(1) No navigate shared computer and
folder in Network Q.47.(2) Star
Q.15.(2) Keyboard Q.38.(3) Bus topology requires a multipoint
connection.
Q.16.(1) Computer in network is work group.
Q.39.(1) Local Area Network refer to a small,
Q.17.(3) For an Ip Address to be valid, there
single-site network.
should be four numbers seperated by
dots, and every number must lie Q.40.(3) Computers connected to a LAN (Local
between 0 to 255 Area Network) can
share information and/ or share
Q.18.(4) Intranet
peripheral equipment.
Q.19.(3) Application layers
Q.41.(2) Gateway
Q.20.(5) All are broad band communication
Q.42.(1) A group of computers and other
channel.
devices connected together is called
Q.21.(4) Cable
Network.
Q.22.(2) half-duplex
Q.43.(4) Transmission Lines are also called as
Q.23.(2) Senior Manage or Chief information circuits channels, or trunks
security officer (CISO) of IT
Q.44.(3) The Switching Elements are also
assurance manager who is in charge of
called as IMPs.
information security.
Q.45.(1) The distance a simple signal can travel
Q.24.(2) Network administrator
in one period is called wavelength.
Q.25.(1) Discrete value

Write us : content@mahendras.org www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETATIVE EXAM

Q.46.(2) 12 Q.61.(4) data communications systems


Q.47.(3) ICMP Q.62.(3) Centralized data processing
Q.48.(1) A network that has only one entry and Q.63.(3) Distributed data processing
exit point. Q.64.(1) network A computer Network system
Q.49.(5) SMTP, HTTP and FTP use TCP. that uses communications equipment
Q.50.(3) Firewall to connect two or more computers and
Q.51.(3) Class C their resources.
Q.52.(1) DNS Server Q.65.(4) The TCP/IP protocol that makes
Internet universality possible.
Q.53.(3) Hub
Q.66.(1) local area network (LAN) A network
Q.54.(2) Switch
of personal computers that share
Q.55.(5) Bridge is used to connect same
hardware, software, and data is called
network segments and manage the
a local area network (LAN).
traffic between them.
Q.67.(4) wide area network (WAN) A network
Q.56.(3) Gateway network devices/systems
of geographically distant computers
translate data from one format to
and terminals is called a wide area
another.
network (WAN).
Q.57.(2) Switches operate on the second layer
Q.68.(1) Client/server In Peer-to-peer network
of OSI Model, that is Data Link Layer.
arrangement, all computers have equal
Q.58.(3) Hub is a Broadcasting Device and status.
Switch is a Unicasting Device.
Q.69.(1) analog Analog Transmission
Q.59.(4) Hub and Switch are used in Star
Q.70.(4) ISDN
topology.
Q.60.(4) Modem

Write us : content@mahendras.org www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETATIVE EXAM

Write us : content@mahendras.org www.mahendras.org www.mahendraguru.com myshop.mahendras.org

You might also like