Computer Science

Computer Networking MCQ-6

FontSize

Q.1 Which of the following is not an scripting language ?
(A) HTML (B) XML
(C) Postscript (D) Javascript
Ans: C Postscript

Q.2 Which of the following is a platform free language
(A) Fortran (B) Assembly
(C) C (D) Java
Ans: D Java

Q.3 A digital signature is
(A) scanned signature (B) signature in binary form
(C) encrypting information (D) handwritten signature
Ans: C encrypting information

Q.4 Mechanism to protect private networks from outside attack is
(A) Firewall (B) Antivirus
(C) Digital signature (D) Formatting
Ans: A Firewall

Q.5 A computer system that permits multiple users to run programs at same time
(A) Real time system (B) Multi programming system
(C) Time sharing system (D) Multi tasking system
Ans: D Multi tasking system

Q.6 A computer communication technology that provides a way to interconnect multiple computer across short distance is
(A) LAN (B) MAN
(C) WAN (D) Wireless network
Ans: A LAN

Q.7 Telnet is a service that runs
(A) Television on net (B) Remote program
(C) Cable TV network (D) Telenext
Ans: B Remote program

Q.8. A device that forwards data packet from one network to another is called a
(A) Bridge (B) Switch
(C) Hub (D) Gateway
Ans: B Switch

Q.9 Which of the following is the fastest media of data transfer
(A) Co-axial Cable (B) Untwisted Wire
(C) Telephone Lines (D) Fibre Optic
Ans: D Fiber Optic.

Q.10 Tool that is used to transfer data/files among computers on the Internet
(A) FTP (B) Archie
(C) TCP (D) Gopher
Ans: C TCP

Q.11 HTML is a
(A) Programming Language (B) Scripting Language
(C) Web Browser (D) Network Protocol
Ans: B Scripting Language

Q.12 Secret-key encryption is also known as
(A) Asymmetric encryption (B) Symmetric encryption
(C) Secret-encryption (D) Private encryption
Ans: D Private encryption

Q.13 The concept of electronic cash is to execute payment by
(A) Credit Card (B) ATM Card
(C) Using computers over network (D) Cheque
Ans: C Using computers over network.

Q.14 SMTP is a
(A) Networking Protocol
(B) Protocol used for transferring message between end user & Mail Server
(C) Protocol used for smart card message interchange
(D) Encryption Standard
Ans: B Protocol used for transferring message between end user & Mail Server.

Q.15 Digital Signature is
(A) Scanned Signature on Computer
(B) Code number of the sender.
(C) Public Key Encryption.
(D) Software to recognize signature.
Ans: D Software to recognize signature

Q.16 Telnet is a
(A) Network of Telephones (B) Television Network
(C) Remote Login (D) Remote Login.
Ans: C Remote Login.

Q.17 The internet is
(A) Network of networks (B) Web site.
(C) Host (D) Server
Ans: A Network of networks

Q.18 An e-business that allows consumer to name their own price for products and services is following which e-business model?
(A) B2B (B) B2G
(C) C2C (D) C2B
Ans: D C2B

Q.19 Kerberos is an encryption-based system that uses
(A) Secret key encryption (B) Public key encryption
(C) Private key encryption (D) Data key encryption
Ans: A Secret key encryption.

Q.19 The method(s) of payment for online consumers are
(A) Electronic cash (B) Credit/debit
(C) Electronic checks (D) All of the above
Ans: D All of the Above.

Q.20 DNS is
(A) The distributed hierarchical naming system
(B) The vertical naming system
(C) The horizontal naming system
(D) The client server system
Ans: C The horizontal naming system.

Q.21 A firewall is
(A) An established network performance reference point.
(B) Software or hardware used to isolate a private network from a public network.
(C) A virus that infects macros.
(D) A predefined encryption key used to encrypt and decrypt data transmissions.
Ans: B Software or hardware used to isolate a private network from a public network.

Q.22 A router
(A) Screens incoming information.
(B) Distributes information between networks
(C) Clears all viruses from a computer system
(D) Is a work virus.
Ans: B Distributes information between networks

Q.23 LDAP stands for
(A) Light weight Data Access Protocol.
(B) Light weight Directory Access Protocol.
(C) Large Data Access Protocol.
(D) Large Directory Access Protocol.
Ans: B -> Light weight Directory Access Protocol.

Q.24 E-Commerce is not suitable for
(A) Sale/Purchase of expensive jewellery and antiques.
(B) Sale/Purchase of mobile phones.
(C) Sale/Purchase of branded clothes.
(D) Online job searching.
Ans: D Online job searching

Q.25 Amazon.com comes under the following model
(A) B2B (B) B2C
(C) C2C (D) C2B
Ans: B B2C

Q.26 Hubs are present in the network
(A) to diagnose line failures, measure and manage traffic flow and simplify reconfiguring of LANs.
(B) to interconnect the LAN with WANs.
(C) to interconnect the WANs with WANs.
(D) to interconnect the WANs with LANs.
Ans: B to interconnect the LAN with WANs.

Q.27 Firewalls operate by
(A) The pre-purchase phase.
(B) isolating Intranet from Extranet.
(C) Screening packets to/from the Network and provide controllable filtering of network traffic.
(D) None of the above.
Ans: C Screening packets to/from the Network and provide controllable filtering of network traffic.

Q.28 The mercantile process model consists of the following pahase(s):
(A) The pre-purchase phase.
(B) Purchase consummation phase.
(C) Post-purchase Interaction phase.
(D) All of the above.
Ans: D All of the Above.

State which of the statement is true and which are false. Write ‘T’ or ‘F’ in the answer book.
Q.29 One disadvantage to online buyers is lack of trust when dealing with unfamiliar sellers
Ans: T
Lack of trust is there obviously as buyer cannot physically see the seller. As Trust is a qualitative function, it develops with time & goodwill.

Q.30 Multimedia contents are not important to e-business applications.
Ans: F Rather Multimedia contents are most important as visual graphics & animations form the core of e-business applications.

Q.31 While making payment using electronic check, credit and debit cards, the server authenticates the customers and verifies with the bank that funds are adequate before purchase.
Ans: T The server authenticates that the customer has enough available balance to carry out transaction.

Q.32 Trojan horse is a program that performs not only a desired task but also includes unexpected malicious functions
Ans: T Trojan horse is a program that performs not only a desired task but also includes unexpected malicious functions.

Q.33 Home Banking is not an example of consumer oriented applications
Ans: F Home Banking is one of the most important examples of consumer-oriented applications as using Home Banking business is carried out just by sitting at home.

Q.34 Electronic checks are another form of electronic tokens.
Ans: T Electronic checks is a part of e-token. When giving e-token some authorizing co. verifies that the no. is active i.e. its run by Certifying authority (CA),Verifying Authority(VA) & Digital Signature(DS).


Please Donate






RSS Feeds

SiteTranslation



Copyright © 2024 ashkerala.com. All Rights Reserved.
Google+ Click to listen highlighted text! Powered By GSpeech