PMSCS in CSE JU Questions & Slove
PMSCS in CSE JU Questions & Slove
PMSCS in CSE JU Questions & Slove
Published By স্বপ্নতরী
Written part:
Q-1.What is Unicode?
Ans: Unicode is an entirely new idea in setting up binary codes for text or script characters. Officially called
the Unicode Worldwide Character Standard, it is a system for "the interchange, processing, and display of
the written texts of the diverse languages of the modern world." It also supports many classical and historical
texts in a number of languages.
Currently, the Unicode standard contains 34,168 distinct coded characters derived from 24 supported
language scripts. These characters cover the principal written languages of the world.
Let’s compute the standard deviation for the set of numbers from 1 to 10. That is, consider the following set
of values: {1, 2, 3, 4, 5, 6, 7, 8, 9, 10}.
This set has a mean of 5.5, which we can determine either with the formula for arithmetic mean or the
balance concept, discussed above.
The deviations from the mean of each number and those deviations squared are:
After the squaring operation, we arrive at a figure for the sum of the squared deviations, which we can divide
by N to get the variance. Since N is 10, the variance is
In other words, 8.25 is the average of the squared deviations.
Finally, to get the standard deviation, we take the square root of the variance.
so the standard deviation is roughly 2.87. On the GMAT, we would not be expected to make that last
calculation on our noteboards; we might be asked to estimate it by noting that that the square root of 8.25 is
a little less than the square root of 9, which is 3.
=2FA
1. Application Layer
2. Transport Layer
3. Internet Layer
sin(x)=x−x3/3!+x5/5!−x7/7!.
7.what do u expect after complete PMSCS program.
TRY yrself
8.1213=6
1415=10
7314=32
6513=24
9.write difference between database scema and instanace
Department of Computer Science and Engineering
Jahangirnagar University
PMSCS Program
Admission Test Fall-2016
1. A card is drawn form a pack of 52 cards .The probability of getting a queen of club or a king of heart is:
a. 1/26 b. 1/52 c. 2/13 d. 1/13
2. Flash memory was developed taking the concept of :
a. EPROM b. EEPROM c. DRAM d. SRAM
3. DRAM refers to
a. Dynamic Random Access Memory b. Direct Random Access Memory
c. None d. Duel Random Access Memory
4. What type of device a Mouse is :
a. Output device b. Input device c. Posting device d. None
5. In C if a function does not explicity specify a return type.it is assumed to return an …….. by default.
a. char b. float c. Void d. integer
6. Datagram is related with ……………… service and virtual circuit is related to………………..service.
a. both are connectionless b. Connectionless and connection oriented.
c. connection oreiented and connectionless d. None
7. In C programming what will be a value of x?
Printf(“x=%d/n”,(number<0)?-1;(number===0?)0;1);
a. 1 b. -1 c. 0 d. None
8. Concurrent access to share data may result in data:
a. recovery b. inconsistency c. repositiory d. consistency
9. A constructor is called whwnever:
a. an object is used b. an object is declared c. a class is declared d. a class is used
Passive Attacks
A passive attack involves someone listening in on telecommunications exchanges or passively recording computer
activity. An example of the former is an attacker sniffing network traffic using a protocol analyzer or some other
packet capturing software. The attacker finds a way to plug into the network and begins capturing traffic for later
analysis. Other attackers rely on keyloggers, usually as a Trojan horse in a "free download," to record keystrokes such
as user IDs and passwords. The goal, regardless of the method, is just to listen and record the data passing through.
The passive attack itself is not harmful, per se, but the information gathered during the session could be extremely
damaging.
Active Attack
Active attacks on computers involve using information gathered during a passive attack, such as user IDs and
passwords, or an outright attack using technological “blunt instruments.” Such instruments include password crackers,
denial-of-service attacks, email phishing attacks, worms and other malware attacks. In an active attack, the attacker
is out to bring a website down, steal information or even destroy computing equipment. As network administrators
install defenses against existing attack tools, hackers develop more sophisticated tools and the game of technology
leapfrog continues.
Find the number of way to select a 4 member comitee with 2 men and 2 women.
Ans: 2 men can be chosen from the 6 men in c(6,2) ways.and the 2 women can be chosen from the 4 women c(4,2)
ways.Thus by the product rule:
N=(6/2)(4/2)
=(6.5/2.1).(4.3/2.1)
=15(6)
=90
Referential integrity is a relational database concept, which states that table relationships must always be consistent.
In other words, any foreign key field must agree with the primary key that is referenced by the foreign key. Thus, any
primary key field changes must be applied to all foreign keys, or not at all. The same restriction also applies to foreign
keys in that any updates (but not necessarily deletions) must be propagated to the primary parent key.
36.let a and b the positive integers and suppose Q is defined recursively as flows Q(a,b)=0 if (a<b),Q(a,b)=Q(a-b,b)+1
if b<=a
Find Q(12,5)
37.find the number n of distinct permutations that can be formed all the letter of this word.UNUSUAL
N=7!/3!
=840 There are 7 letter of which 3 are U and no other letter is repeated.
while (a<=100) {
a++;
Ans: 172,173
2 4 2
1 2 1
a. Laplacian
b. Isotropic
c. Position
13. This is an IP address 168.212.226.204 which class this address belong to?
a. Class A
b. Class B
c. Class C
d. Class D
14. Creating a new class using one or more existing classes is known as-----------------?
a. Polymorphism
b. Encapsulation
c. Overloading
d. Inheritance
15. A switch is most often used to connect
a. Individual Computer
b. Different LANs
c. Cable segments of a LAN
16. If n and k are positive integers and 8n=2k , What is the value of n/k?
a. ¼
b. ½
c. 1/3
d. 4
17. The scream of a hierarchical database represented using a ------------ diagram.
Ans: tree-structure
18. A trigger is ……………….
a. A special type of table
b. A special type of store procedure, executed when certain events occurs
c. A special type of view
19. Synonym of PROBITY
a. Probability
b. Honesty
c. Peaceful
d. Carelessness
20. Determine the maximum value the slope of the curve y = sin(x)
y = sin(x)
21. The decimal number -34 is expressed in 2’s complement form as:
a. 10000110
b. 11011001
c. 11011110
d. 11011100
22. What will be the next two numbers of the series?
2 5 6 11 9 17 12 23 , --, --
Ans : 15, 29
23. What is big O?
Ans: Big O notation is used in Computer Science to describe the performance or complexity of an
algorithm. Big O specifically describes the worst-case scenario, and can be used to describe the execution
time required or the space used (e.g. in memory or on disk) by an algorithm.
24. If a sweater sells for $48 after a 25% markdown, what was its original price?
Ans:
(100-25) = 75% = 75/100 = 0.75
0.75*x = 48
So, x = $64 dollars was the original price of the sweater.
25. Which of the following memory needs refreshing?
a. SRAM
b. DRAM
c. ROM
d. All of the avobe
26. The amount of time a program takes from when a request was submitted untill the first result is processed.
a. Waiting time
b. Response time
c. Turnaround time
d. Throughround time
27. What is the following is the subset of {b c d}?
a. { }
b. {n}
c. {1, 2, 3}
d. {a, b, c}
28. Digital modulation on bit string is sender--------------- layer of OSI
Ans: Physical
Written Part
31. Distinguish between database schema and instance.
Database schema: The term "schema" refers to the organization of data as a blueprint of how the database is
constructed (divided into database tables in the case of relational databases). The formal definition of
a database schema is a set of formulas (sentences) called integrity constraints imposed on a database.
Database Instance: Introduction to the Oracle Database Instance. A database instance is a set of memory
structures that manage database files. A database is a set of physical files on disk created by the CREATE
DATABASE statement. The instance manages its associated data and serves the users of the database.
32. What is the main problem with MAC address based communication over the Internet instead of IP address?
Ans: There are [Media Access Control] MAC addresses available. The only organizational structure of them
is by manufacturer grouping, which is completely useless for routing purposes. Thus, you’d have to be able
to carry around all of the MAC addresses currently on the Internet at any one time. And maintain it.
Broadcast mechanisms are useless at that scale, so now your routing protocols have to carry trillions of
addresses, all of which are under continual flux.
IP addresses are assigned topologically (or should be, if politics didn’t get in the way… grrr…). By assigning
a host an address based on its topological attachment, we can only carry around an abstraction of the topology
in routing protocols.
Data Definition Language (DDL) statements are used to define the database structure or schema. Some
examples:
Data Manipulation Language (DML) statements are used for managing data within schema objects. Some
examples:
34. What is the minimum number of students in a class to be sure that three of them are born in the same month?
Ans: The solution uses a concept known as the Pigeonhole principle. The idea is that if you n items
and m possible containers. If n > m, then at least one container must have two items in it.
So for your question... there are twelve months, so in order to guarantee you have three students in a "month"
container. You need something greater than twelve - the minimum of that would be thirteen.
35. What is WiMAX? Write down the name of OSI model.
WiMAX: WiMAX is a wireless technology put forth by the WiMAX Forum that is one of the technologies
that is being used for 4G networks. It can be used in both point to point and the typical WAN type
configurations that are also used by 2G and 3G mobile network carriers. Its formal name is IEEE standard
802.16
Name of OSI model:
1. Physical Layer
2. Datalink Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
36. Define the Bandwidth and Latency.
Bandwidth: Bandwidth is also defined as the amount of data that can be transmitted in a fixed amount of
time. For digital devices, the bandwidth is usually expressed in bits per second(bps) or bytes per second. For
analog devices, the bandwidth is expressed in cycles per second, or Hertz (Hz).
Latency: Network latency is an expression of how much time it takes for a packet of data to get from one
designated point to another. In some environments (for example, AT&T), latency is measured by sending a
packet that is returned to the sender; the round-trip time is considered the latency.
37. Describe your expectation about PMSCS program of the CSE department in five sentence.
38. What is the output if you will compile and execute the following C code?
a. void main(){
int i=4,x;
x=++i + ++i + ++i;
printf("%d",x);
}
Output: 21
b. void main()
{
int a=10;
printf("%d %d %d",a,++a,a++);
}
Output: 12 12 10
39. What is the difference between WHILE and DO WHILE statements?
Ans: while won't execute even once if the condition returns a false; do-while will run at least once before the
condition switches. There are many differences between while loop and do-while loop. The difference is
that the do while loop executes at least once because it checks for the loop condition while exiting.
40. Suppose a=2, b=8. Find there arithmetic mean and geometric mean.
AM = (a+b)/2 = (2+8)/2 = 5
GM = √(ab) = √(2*8) = 4
Answers:
1.c 2.a 3.b 4.c 5.c 6 7.a 8.a 9.Pita 10. 11.b 12.c 13.b 14.d 15.a
16.c 17 18.b 19.b 20 21.c 22 23 24 25.a 26.b 27.a 28 29.c 30.b
GROUP- A: Put a tick mark ( ) on the correct answer for multiple choice questions (MCQ)
and Fill in the
gaps where applicable. Each question carries 1 (one) point.
1. This is an IP address 168.212.226.204. On which class this
address belongs to?
(a) Class A (b) Class B (c) Class C (d) Class D
2. A={4,2,3}. What is the cardinality of set A?
(a) 24 (b) 3 (c) 2 (d) 9
3. Which one of the following is more near is meaning to the word
“outskirt”?
(a) Dress (b) Boundary (c) Sky (d) None of the above
4. Who preside the interface between a process and the OS?
(a) Kernel (b) System Calls (c) API (d) Processor
5. In TCP/IP network, the port address is
(a) 16-bit (b) 32-bit (c) 64-bit (d) 128-bit
6. A perfectionist is someone who feels _______ when he makes
even the most minuscule of errors.
(a) hostility (b) indifference (c) vexation (d) condemnation
7. What is the average of the five angles?
(a) 45
(b) 72
(c) 60
(d) 48
8. The perpendicular of the line 2x+3y=4 is
(a) 3x-2y=4 (b) 3x+2y=4 (c) 2x-3y=4 (d) 2x-3y=0
9. In case of fiber-optic cables, which transmission mode is used for
transmission data over long distance?
(a) Infrared (b) Radio (c) Single mode (d) Multimode
10. If you want your conditional to depend on two conditions both
being true, what is the proper notation to put between the two
Boolean statements?
(a) || (b) & (c) | (d) &&
11. The complexity of linear search algorithm is
(a) O(n) (b) O(logn) (c) O(n2) (d) O(nlogn)
12. Which of the following data structure is not linear data structure?
(a) Arrays (b) Linked lists
(b) Both of the above (d) None of the above
13. The function of LLC sub-layer of data link layer are:
(a) Framing and channel allocation
(b) Channel allocation and error control
(c) Error control and security
(d) Framing and error control
14. What is the type of the image?
013
184 246 12
12 75 90
I
(a) RGB (b) Gray Scale (c) Binary (d) NTSC
15. POST means
(a) Post Operating System Test (b) Power On Self Test
(c) Power On Self Timing (d) None
16. The intersection ( ) operation on two relations/tables returns
(a) All records of both tables
(b) Only common records
(c) Records from the left table/relation only
(d) None
17. IPV6 increases the size of the IP address from
(a) 64 to 132 bits (b) 32 to 128 bits
(c) 64 to 128 bits (d) None
18. We should keep pace _________ time and technology.
(a) in (b) out (c) with (d) none
19. The ___Cache___________ memory is placed between RAM and CPU.
20. Write the equation of a circle with radius r and center is at (0,0).
X2+y2=r2
21. Volatile is most nearly opposite in meaning to
(a) Flighty (b) Calm (c) Variegated (d) Rancid
22. What percent of 50 is 0.15?
(a) 0.3 (b) 1.5 (c) 0.03 (d) None of these
23. Which of the following memories needs refresh?
(a) SRAM (b) DRAM (c) ROM (d) All of above
Set: ADA
a0
3a0
3a0
3a0
2a0
Page 2 of 2
24. VLANs can __________.
(a) reduce network traffics
(b) provide an extra measure of security
(c) either (a) or (b)
(d) both (a) and (b)
25. The primary purpose of an operation system is:
(a) To make computers easier to use
(b) To make the most efficient use if the computer hardware
(c) To keep systems programmers employed
(d) To allow people to use the computer
26. Which of the following is not usually part of the responsibilities
of a database administrator?
(a) Approving structural changes to the database
(b) Designing data entry screens
(c) Ensuring that an adequate back-up regime is in place
(d) Issuing accounts to users
27. Which of the following is generally a benefit of normalization?
(a) Performance is improved
(b) Insertion anomalies are avoided
(c) Selection anomalies are avoided
(d) Number of tables is reduced
28. Frames from one LAN can be transmitted to another LAN via the
device –
(a) Router (b) Repeater (c) Modem (d) Bridge
29. Which of the following is not based on all the observation?
(a) Mode (b) Arithmetic Mean
(c) Geometric Mean (d) Harmonic Mean
30. Which of the numbers does not belong in the following series?
2-3-6-7-8-14-15-30
(a) 3 (b) 7 (c) 8 (d) 15
1. Planning
3-Tier Architecture is most commonly used to build web applications. In this model, the browser acts like a client,
middleware or an application server contains the business logic, and database servers handle data functions. This
approach separates business logic from display and data.So the 3 layers commonly known as:Presentation
Layer(PL/UI),Business Logic Layer(BLL) & Data Access Layer(DAL).
35. Evaluate 0 2ln(e x )dx
36. How many users are possible from the subnet mask of
255.255.255.224 of class C IP.
30
37. Write down the SQL DDL definition to create a bank account
relation with a primary key declaration.
create table account
(account_number char(10),
branch_name char(15),
balance integer,
primary key (account_number),
foreign key (branch_name) references branch )
38. List the Four important layers of the OSI model in order.
Physical (Layer 1)
Data Link (Layer 2)
Network (Layer 3)
Transport (Layer 4)
39. Two sides of a triangular field are of the same length 13ft. Third
side is 10’ in length. Find the area of the field in square feet?
A=65 squre feet
40. If the letter in the word ‘TRIANGLE’ are rearranged at random,
find the probability that the first letter is an A.
Solution:
= 1 · 7 · 6 · 5 · 4 ·3 · 2 ·1 = 1
8 · 7 ·6 · 5 · 4 · 3 · 2 · 1 8
a. OCR
b. OMR
c. MICR
d. PLOTTER
a. ROM
b. Control Unit
c. ALU
d. RAM
3. Which of the following methods is involved in data transmission between keyboards and CPU?
a. Simplex
b. Duplex
c. Half Duplex
d. None of them
4. Database is a---?
a. Collection of files
b. Collection of data
c. Collection of interrelated data
d. all of them
5. An entity is a/an--
a. Collection of items in an application
a. Inanimate object in an application
a. District real world item in an application
a. Data structure
6. A distribute database has which of the following advantage over a centralized database?
a. Software cost
b. Software complexity
c. Slow response
d. Modular growth
7. Which of the following describes E-commerce?
a. Buying products from each other
b. Buying services from each other
c. Selling services from each other
d. All of above
8. Rearrange the following letters to make a word and choose the category in which it fits MENMYSINGH.
a. City
b. fruit
c. Bird
d. vegetable
9. The speed of supercomputers genereally measured in….
Ans: GHZ
12. What wil be the next two numbers in the following series.
4,10,5,12,5,14, ……,……..(7,16)
13. If a<b then Q(a,b)=0 otherwise Q(a,b)=Q(a-b,b)+1 Find Q(12,5).
Ans:
14. HTML is simple and easy. Why is it not used more often in programming?
a. Its monelary expense outweighs its benefits.
b. It cannot handle the high volume and complexity of business transactions
c. Inherent deficiencless in the language cause
d. all of the above
15. XML makes it easier for.
a. Human to read web sites
b. Machine to read web sites
c. Both of the above
d. Neither of the above
16. Which One of the following are methods or means of safeguarding computer systems?
a. Physical traits of users b. Worms
c. password d. a and c
17. Which one is more faster on the basis of data access retrival time?
a. Flash memory b. Cache memory
c. blue ray device d. hard disk
19. What output will you get from the following program?
Void main()
{
float t;
t=4/5+9%4;
print(%21,1)
}
a. 1.80 b. 1.00 c. 0.00 d. 3.05
GROUP B:
31.Short Note:Interpreter
In computer science, an interpreter is a computer program that directly executes, i.e. performs, instructions
written in a programming or scripting language, without previously compiling them into a machine language
program.
Compiler:
A compiler is a special program that processes statements written in a particular programming language and
turns them into machine language or "code" that a computer's processor uses. Typically, a programmer
writes language statements in a language such as Pascal or C one line at a time using an editor. The file that
is created contains what are called the source statements. The programmer then runs the appropriate
language compiler, specifying the name of the file that contains the source statements.
32.what are the function of operating system?
An operating system has three main functions: (1) manage the computer's resources, such as the central
processing unit, memory, disk drives, and printers, (2) establish a user interface, and (3) execute and provide
services for applications software.
33.Write down the basic structure of SQL.
Basic structure of an SQL expression consists of select, from and where clauses.
#include<stdio.h>
Main(){
Int count;
Count=0;
While(count<100){
Count++;
Printf(“hello world?\n”)
}
}
Ans:Using do-while:
#include<stdio.h>
Main(){
Int count=0;
Do{
Printf(“hello world?\n”)
Count++;
}
While(count<100)
}
37.what you will see if you run the following codes.
#include<stdio.h>
Main(){
Int first =15,second=10,sum;
Printf(“enter two integer:”);
Scanf(“%d %d,&first,&second”);
Printf(“The two number are : “%d %d\n”,first,second);
Sum=first+second;
Printf(“Their sum is: %d\n”,sum);
}
Output:25
38.Evaluate sinxcos2xdx
39.if y=ex logx find dy/dx at x=1
40.Draw a flowchart to find out the smallest number from three integers
1.d 6. 11. 16.b 21. Polish 26 31. 36.118&38 41. 46. A media
c notation, also . access control
known as address (MAC
prefix address) of a
notation, is a computer is a
symbolic unique
logic invented identifier
by Polish assigned to
mathematicia network
n Jan interfaces for
Lukasiewicz communication
in the 1920's. s at the data link
When using layer of a
Polish network
notation, the segment. MAC
instruction addresses are
(operation) used as a
precedes the network
data address for
(operands). In most IEEE 802
Polish network
notation, the technologies,
order (and including
only the Ethernet and
order) of Wi-Fi.
operations
and operands
determines
the result,
making
parentheses
unnecessary.
2.b 7.5 12. 17.c 22. 27 32.4 37.b 42. 47.b
c . 9
3.c 8.2 13. 18. 23. 28 33. 38. 43. 48.b
0 c .
4.a 9.c 14. 19. 24. 29 34.c 39. Light 44. 49. small
Founders: . Fidelity or Li-Fi electric
Mark is a Visible Light magnetic
Zuckerberg Communication
, Dustin s (VLC) system
Moskovitz, running wireless
communications
Andrew travelling at very
McCollum, high speeds. Li-
Eduardo Fi uses common
Saverin, household LED
Chris (light emitting
Hughes diodes)
lightbulbs to
enable data
transfer,
boasting speeds
of up to 224
gigabits per
second
5. 10.a 15. 20. 25. 30 35.a 40. 45. 50.b
megabits c . d
per
second,
or Mbps
Compute
r -
Memory
Units
Department of Computer Science and Engineering
Jahangirnagar University
PMSCS Program
Admission Test Fall-2013
a. Physical
b. Network
c. session
d. None
2. Which technic is Preferable for huge data transfer between I/O and memory?
b. Islolated I/O
c. Interrupt I/O
d. DMA
a. X=Y
b. X=√Y
c. Y=√X
d. X =Y/2
4. If the eccentricity of a circle eclipse and parabola are e1,e2,e3 then which one is true?
a. e1<e2< e3
b. e1> e2> e3
c. e2>e3>e1
d. e1>e3>e2
6. Mr. karim earns X taka in 3 months and expends the same amount in 4 months .How much he saves in a year?
a. He has no savings
b. 3x taka
c. x taka
d. 4x taka
7. Fill in the blank:
Take ---off------ What I say.
a. off
b. up
c. on
d. Down
10. What will be mass of an object traveling with the speed of light?
Ans: To be massless is to travel at the speed of light; to travel slower than the speed of light is to have mass.
11. Expand the term http..
Ans: Hypertext Transfer Protocol.
18. If p and q are prime numbers, how many divisors does the product p3 q6 have?
a. 9 b. 28 c. 18 d. 12
19. What social networking website started out as a band promotion service?
a. facebook b. MySpace C. Linkedin d. Twitter
20. which of the following terms does not describe a type of flash drive ?
a. hard drive b. pen drive c. jump drive d. thumb drive
21. What type of RAM is must often used for syetem memory?
a. SRAM b. PRAM c. SDRAM d. VRAM
22. Where the mass of an object is zero?
Ans: An object with zero mass must move at the speed of light or it wouldn't exist at all.
35. Hub falls in…physical layer and bridge falls in…Data link……layer.
36. MPEG is compressed form of……..file.
a. Audio b. Video c. Text file d. A and B
37. Fill up the “?” cell.
Ans: 41,66,109
Expand HCMOS?
High-density n- type Complimentary Metal Oxide Silicon field effect transistor.
What is an interrupt?
Interrupt is a signal send by external device to the processor so as to request the processor to perform a particular
work.
Expand DMA?
Direct Memory Access
What is NV-RAM?
Nonvolatile Read Access Memory, also called Flash memory.
What is a flag?
Flag is a flip-flop used to store the information about the status of a processor and the status of the instruction
executed most recently
11 – d 12 – d 13 – a 14 – d 15 – d 16 – d 17 – d 18 – c 19 – c 20 – b
21 – a 22 – a 23 – a 24 – d 25 – a 26 – b 27 – a 28 – d 29 – b 30 – c
31 – a 32 – c 33 – d 34 – b 35 – b 36 – d 37 – a 38 – d 39 – a 40 – c
41 – b 42 – d 43 – c 44 – b 45 – a 46 – a 47 – a 48 – c 49 – c 50 - c
51 – c 52 – d 53 – a 54 – a 55 – a 56 – b 57 – c 58 – a 59 – a 60 – d
Answer:a
Explanation:None.
2. A DNS client is called
a) DNS updater
b) DNS resolver
c) DNS handler
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
3. Servers handle requests for other domains
a) directly
b) by contacting remote DNS server
c) it is not possible
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
4. DNS database contains
a) name server records
b) hostname-to-address records
c) hostname aliases
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
advertisements
5. If a server has no clue about where to find the address for a hostname then
a) server asks to the root server
b) server asks to its adjcent server
c) request is not processed
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
6. Which one of the following allows client to update their DNS entry as their IP address change?
a) dynamic DNS
b) mail transfer agent
c) authoritative name server
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
7. Wildcard domain names start with label
a) @
b) *
c) &
d) #
View Answer
Answer:b
Explanation:None.
8. The right to use a domain name is delegated by domain name registers which are accredited by
a) internet architecture board
b) internet society
c) internet research task force
d) internet corporation for assigned names and numbers
View Answer
Answer:d
Explanation:None.
advertisements
Answer:c
Explanation:None.
1. A piece of icon or image on a web page associated with another webpage is called
a) url
b) hyperlink
c) plugin
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
2. Dynamic web page
a) is same every time whenever it displays
b) generates on demand by a program or a request from browser
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
3. What is a web browser?
a) a program that can display a web page
b) a program used to view html documents
c) it enables user to access the resources of internet
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
4. Common gateway interface is used to
a) generate executable files from web content by web server
b) generate web pages
c) stream videos
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
advertisements
Answer:a
Explanation:None.
7. Which one of the following is not used to generate dynamic web pages?
a) PHP
b) ASP.NET
c) JSP
d) none of the mentioned
View Answer
Answer:d
Explanation:None.
8. An alternative of javascript on windows platform is
a) VBScript
b) ASP.NET
c) JSP
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
Computer Networks Questions & Answers – HTTP & FTP
1. Multiple object can be sent over a TCP connection between client and server in
a) persistent HTTP
b) nonpersistent HTTP
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
2. HTTP is ________ protocol.
a) application layer
b) transport layer
c) network layer
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
3. In the network HTTP resources are located by
a) uniform resource identifier
b) unique resource locator
c) unique resource identifier
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
4. HTTP client requests by establishing a __________ connection to a particular port on the server.
a) user datagram protocol
b) transmission control protocol
c) broader gateway protocol
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
advertisements
5. In HTTP pipelining
a) multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses
b) multiple HTTP requests can not be sent on a single TCP connection
c) multiple HTTP requests are sent in a queue on a single TCP connection
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
6. FTP server listens for connection on port number
a) 20
b) 21
c) 22
d) 23
View Answer
Answer:b
Explanation:None.
7. In FTP protocol, client contacts server using ____ as the transport protocol.
a) transmission control protocol
b) user datagram protocol
c) datagram congestion control protocol
d) stream control transmission protocol
View Answer
Answer:a
Explanation:None.
8. In which mode FTP, the client initiates both the control and data connections.
a) active mode
b) passive mode
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
advertisements
9. The file transfer protocol is built on
a) data centric architecture
b) service oriented architecture
c) client server architecture
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
10. In file transfer protocol, data transfer can be done in
a) stream mode
b) block mode
c) compressed mode
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
Computer Networks Questions & Answers – Ethernet
Answer:a
Explanation:None.
2. What is stat frame delimeter (SFD) in ethernet frame?
a) 10101010
b) 10101011
c) 00000000
d) 11111111
View Answer
Answer:b
Explanation:None.
3. MAC address is of
1) 24 bits
b) 36 bits
c) 42 bits
d) 48 bits
View Answer
Answer:d
Explanation:None.
4. What is autonegotiation?
a) a procedure by which two connected devices choose common transmission parameters
b) a security algorithm
c) a routing algorithm
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
advertisements
Answer:a
Explanation:None.
7. High speed ethernet works on
a) coaxial cable
b) twisted pair cable
c) optical fiber
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
8. The maximum size of payload field in ethernet frame is
a) 1000 bytes
b) 1200 bytes
c) 1300 bytes
d) 1500 bytes
View Answer
Answer:d
Explanation:None.
advertisements
Answer:b
Explanation:None.
Computer Networks Questions & Answers – Wireless LAN
Answer:a
Explanation:None.
2. In wireless ad-hoc network
a) access point is not required
b) access point is must
c) nodes are not required
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
3. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
4. In wireless distribution system
a) multiple access point are inter-connected with each other
b) there is no access point
c) only one access point exists
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
advertisements
Answer:a
Explanation:None.
7. Mostly ________ is used in wireless LAN.
a) time division multiplexing
b) orthogonal frequency division multiplexing
c) space division multiplexing
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
8. Which one of the following event is not possible in wireless LAN.
a) collision detection
b) Acknowledgement of data frames
c) multi-mode data transmission
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
advertisements
Answer:a
Explanation:None.
Computer Networks Questions & Answers – WiMAX
Answer:c
Explanation:None.
3. WiMAX uses the
a) orthogonal frequency division multiplexing
b) time division multiplexing
c) space division multiplexing
d) all of the mentioned
View Answer
Answer:a
Explanation:None.
4. Which one of the following modulation scheme is supported by WiMAX?
a) binary phase shift keying modulation
b) quadrature phase shift keying modulation
c) quadrature amplitude modulation
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
advertisements
Answer:c
Explanation:None.
7. WiMAX provides
a) VoIP services
b) IPTV services
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
8. Devices that provide the connectivity to a WiMAX network are known as
a) subscriber stations
b) base stations
c) gateway
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
advertisements
Answer:b
Explanation:None.
Computer Networks Questions & Answers – Bluetooth
Answer:a
Explanation:Piconet is the basic unit of bluetooth system having a master node and upto seven active slave nodes.
2. In a piconet, there can be up to _____ parked nodes in the net.
a) 63
b) 127
c) 255
d) 511
View Answer
Answer:c
Explanation:None.
3. Bluetooth is the wireless technology for
a) local area network
b) personal area network
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
4. Bluetooth uses
a) frequency hoping spread spectrum
b) orthogonal frequency division multiplexing
c) time division multiplexing
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
advertisements
5. Unauthorised access of information from a wireless device through a bluetooth connection is called
a) bluemaking
b) bluesnarfing
c) bluestring
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
6. What is A2DP (advanced audio distribution profile)?
a) a bluetooth profile for streaming audio
b) a bluetooth profile for streaming video
c) a bluetooth profile for security
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
7. In the piconet of bluetooth one master device
a) can not be slave
b) can be slave in another piconet
c) can be slave in the same piconet
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
8. Bluetooth transceiver devices operate in ______ band.
a) 2.4 GHz ISM
b) 2.5 GHz ISM
c) 2.6 GHz ISM
d) 2.7 GHz ISM
View Answer
Answer:a
Explanation:None.
advertisements
9. The bluetooth supports
a) point-to-point connections
b) point-to-multipoint connection
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
10. A scatternet can have maximum
a) 10 piconets
b) 20 piconets
c) 30 piconets
d) 40 piconets
View Answer
Answer:a
Explanation:None.
Computer Networks Questions & Answers – ATM & Frame Relay
Answer:b
Explanation:None.
2. To join the internet, the computer has to be connected to a
a) internet architecture board
b) internet society
c) internet service provider
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
3. Internet access by transmitting digital data over the wires of a local telephone network is provided by
a) leased line
b) digital subscriber line
c) digital signal line
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
4. ISP exchanges internet traffic between their networks by
a) internet exchange point
b) subscriber end point
c) ISP end point
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
advertisements
Answer:c
Explanation:None.
7. Internet works on
a) packet switching
b) circuit switching
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
8. Which one of the following is not an application layer protocol used in internet?
a) remote procedure call
b) internet relay chat
c) resource reservation protocol
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
advertisements
Answer:d
Explanation:None.
Explanation:None.
Computer Networks Questions & Answers – Cryptography
Answer:a
Explanation:None.
2. In asymmetric key cryptography, the private key is kept by
a) sender
b) receiver
c) sender and receiver
d) all the connected devices to the network
View Answer
Answer:b
Explanation:None.
3. Which one of the following algorithm is not used in asymmetric-key cryptography?
a) RSA algorithm
b) diffie-hellman algorithm
c) electronic code book algorithm
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
4. In cryptography, the order of the letters in a message is rearranged by
a) transpositional ciphers
b) substitution ciphers
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
advertisements
Answer:a
Explanation:None.
7. Which one of the following is a cryptographic protocol used to secure HTTP connection?
a) stream control transmission protocol (SCTP)
b) transport layer security (TSL)
c) explicit congestion notification (ECN)
d) resource reservation protocol
View Answer
Answer:b
Explanation:None.
8. Voice privacy in GSM cellular telephone protocol is provided by
a) A5/2 cipher
b) b5/4 cipher
c) b5/6 cipher
d) b5/8 cipher
View Answer
Answer:a
Explanation:None
advertisements
Answer:a
Explanation:None.
Computer Networks Questions & Answers – Security In The Internet
This set of Computer Networks Questions & Answers focuses on “Network Attacks”.
1) The attackers a network of compromised devices known as
a) Internet
b) Botnet
c) Telnet
d) D-net
View Answer
Answer: b
Explanation: None.
2) Which of the following is a form of DoS attack ?
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
3) The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the
target host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
View Answer
Answer: c
Explanation: None.
advertisements
4)The DoS attack is which the attacker sends deluge of packets to the targeted host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
View Answer
Answer: b
Explanation: None.
5) Packet sniffers involve
a) Active receiver
b) Passive receiver
c) Both of the mentioned
d) None of the mentioned
View Answer
Answer: b
Explanation: They donot inject packets into the channel.
6) Sniffers can be deployed in
a) Wired environment
b) WiFi
c) Ethernet LAN
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
advertisements
This section of our 1000+ Computer Networks MCQs focuses on DHCP Protocol.
1. DHCP (dynamic host configuration protocol) provides _____ to the client.
a) IP address
b) MAC address
c) url
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
2. DHCP is used for
a) IPv6
b) IPv4
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
3. The DHCP server
a) maintains a database of available IP addresses
b) maintains the information about client configuration parameters
c) grants a IP address when receives a request from a client
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
4. IP assigned for a client by DHCP server is
a) for a limited period
b) for unlimited period
c) not time dependent
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
advertisements
5. DHCP uses UDP port ____ for sending data to the server.
a) 66
b) 67
c) 68
d) 69
View Answer
Answer:b
Explanation:None.
6. The DHCP server can provide the _______ of the IP addresses.
a) dynamic allocation
b) automatic allocation
c) static allocation
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
7. DHCP client and servers on the same subnet communicate via
a) UDP broadcast
b) UDP unicast
c) TCP broadcast
d) TCP unicast
View Answer
Answer:a
Explanation:None.
8. After obtaining the IP address, to prevent the IP conflict the client may use
a) internet relay chat
b) broader gateway protocol
c) address resolution protocol
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
advertisements
Answer:c
Explanation:None.
Computer Networks Questions & Answers – SSH
This section of our 1000+ Computer Networks MCQs focuses on SSH Protocol.
1. Secure shell (SSH) network protocol is used for
a) secure data communication
b) remote command-line login
c) remote command execution
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
2. SSH can be used in only
a) unix-like operating systems
b) windows
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
3. SSH uses _______ to authenticate the remote computer.
a) public-key cryptography
b) private-key cryptography
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
4. Which standard TCP port is assigned for contacting SSH servers?
a) port 21
b) port 22
c) port 23
d) port 24
View Answer
Answer:b
Explanation:None.
advertisements
5. Which one of the following protocol can be used for login to a shell on a remote host except SSH?
a) telnet
b) rlogin
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:SSH is more secured then telnet and rlogin.
6. Which one of the following is a file transfer protocol using SSH?
a) SCP
b) SFTP
c) rsync
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
7. SSH-2 does not contain
a) transport layer
b) user authentication layer
c) physical layer
d) connection layer
View Answer
Answer:c
Explanation:None.
8. Which one of the following feature was present in SSH protocol, version 1?
a) password changing
b) periodic replacement of session keys
c) support for public-key certificates
d) none of the mentioned
View Answer
Answer:d
Explanation:None.
advertisements
Answer:d
Explanation:None.
Computer Networks Questions & Answers – SMTP
Answer: c
Explanation: None.
3) Expansion of SMTP is
a) Simple Mail Transfer Protocol
b) Simple Message Transfer Protocol
c) Simple Mail Transmission Protocol
d) Simple Message Transmission Protocol
View Answer
Answer: a
Explanation: None.
4) In SMTP, the command to write recievers mail adress is written with this command
a) SEND TO
b) RCPT TO
c) MAIL TO
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
5) The underlying Transport layer protocol used by SMTP is
a) TCP
b) UDP
c) Either a or b
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
advertisements
Answer: a
Explanation: None.
9) A session may include
a) Zero or more SMTP transactions
b) Exactly one SMTP transactions
c) Always more than one SMTP transactions
d) Number of SMTP transactions cant be determined
View Answer
Answer: a
Explanation: None.
10) Example of user agents for e-mail
a) Microsoft Outlook
b) Apple Mail
c)
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
advertisements
11) When the sender and the receiver of an email are on different systems, we need only ______ .
a) One MTA
b) Two UAs
c) Two UAs and one pair of MTAs
d) Two UAs and two pairs of MTAs
View Answer
Answer: d
Explanation: None.
12) User agent does not support this
a) Composing messages
b) Reading messages
c) Replying messages
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
Computer Networks Questions & Answers – RPC
Answer: a
Explanation: Error reporting is handled by ICMP.
2. Which of the following field in IPv4 datagram is not related to fragmentation?
a) Flags
b) Offset
c) TOS
d) Identifier
View Answer
Answer: c
Explanation: TOS-type of service identifies the type of packets.
3. The TTL field has value 10. How many routers (max) can process this datagram?
a) 11
b) 5
c) 10
d) 1
View Answer
Answer: c
Explanation: TTL field is decremented by one each time the datagram is processed by a router.
advertisements
4. If the value in protocol field is 17, the transport layer protocol used is ____.
a) TCP
b) UDP
c) Either of the mentioned
d) None of the mentioned
View Answer
Answer: b
Explanation: For TCP it is 6.
5. The data field can carry which of the following?
a) TCP segemnt
b) UDP segment
c) ICMP messages
d) None of the mentioned
View Answer
Answer: c
Explanation: Data field usually has tranaport layer segment, but it can also carry ICMP messages.
6. What should be the flag value to indicate the last fragment?
a) 0
b) 1
c) TTl value
d) None of the mentioned
View Answer
Answer: a
Explanation: flag=0 indicates that it is the last fragment.
7. Which of these is not applicable for IP protocol?
a) is connectionless
b) offer reliable service
c) offer unreliable service
d) None of the mentioned
View Answer
Answer: b
Explanation: Ip offers unreliable service.
advertisements
Answer: a
Explanation: offset field specifies where the fragment fits in the original datagram.
Computer Networks Questions & Answers – IPv6
Answer: b
Explanation: An IPv6 address is 128 bits long.
2. The header length of an IPv6 datagram is _____.
a) 10bytes
b) 25bytes
c) 30bytes
d) 40bytes
View Answer
Answer: d
Explanation: IPv6 datagram has fixed header length of 40bytes, which results is faster processing of the
datagram.
3. In the IPv6 header,the traffic class field is similar to which field in the IPv4 header?
a) Fragmentation field
b) Fast-switching
c) ToS field
d) Option field
View Answer
Answer: c
Explanation: This field enables to have different types of IP datagram.
4. IPv6 doesnot use ______ type of address
a) Broadcast
b) Multicast
c) Anycast
d) None of the mentioned
View Answer
Answer: a
Explanation: Broadcast has been eliminated in IPv6.
advertisements
Answer: a
Explanation: The Hop limit value is decremented by one by a router when the datagram is forwaded by the
router. When the value becomes zero the datagram is discarded.
7. Dual-stack approach refers to
a) Implementing Ipv4 with 2 stacks
b) Implementing Ipv6 with 2 stacks
c) Node has both IPv4 and IPv6 support
d) None of the mentioned
View Answer
Answer: c
Explanation: dual-stack is one of the approach used to support IPv6 in already existing systems.
8. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by
intervening IPv4 routers. The best solution here is
a) use dual-stack approach
b) Tunneling
c) No solution
d) Replace the system
View Answer
Answer: b
Explanation: The IPv4 routers can form a tuunel.
advertisements
9. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits
a) 96 to 127
b) 0 to 63
c) 80 to 95
d) 64 to 79
View Answer
Answer: a
Explanation: Bits 96 to 127 in the datagram represents obfuscated 1Pv4 address.
1. The _____ states that a foreign key must either match a primary key value in another relation or it
must be null.
(a) entity integrity rule
(b) referential integrity constraint
(c) action assertion
(d) composite attribute
(e) None of these
2. An applet __________
(a) is an interpreted program that runs on the client
(b) tracks the number of visitors to a Website
(c) is a compiled program that usually runs on the client
(d) collects data from visitors to a Website
(e) None of these
3. A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in
the boot sector of a floppy disk or the master boot record of a hard disk.
(a) system virus
(b) Trojan horse virus
(c) file virus
(d) macro virus
(e) None of these
4. Which error detection method uses one's complement arithmetic?
(a) Simply parity check
(b) Checksum
(c) Two-dimensional parity check
(d) CRC
(e) None of these
5. A result of a computer virus can not lead to ___.
(a) Disk Crash
(b) Mother Board Crash
(c) Corruption of program
(d) Deletion of files
(e) None of these
6. The network interface card of LAN is related to following layer of OSI Model-
(a) Transport
(b) Network
(c) Data Link
(d) Physical
(e) All of these
7. Which of the following does not describe a data warehouse?
(a) Subject-oriented
(b) Integrated
(c) Time-variant
(d) Updateable
(e) None of these
8. Which of the following is true ?
(a) Logical design is software-dependent
(b) In a distributed database, database is stored in one physical location
(c) Conceptual design translates the logical design into internal model
(d) Logical design is software independent
(e) None of these
9. A range check _____
(a) ensures that only the correct data type is entered into a field
(b) verifies that all required data is present
(c) determines whether a number is within a specified limit
(d) tests if the data in two or more associated fields is logical
(e) None of these
10. The total set of interlinked hypertext documents worldwide is-
(a) HTTP
(b) Browser
(c) WWW
(d) B2B
(e) None of these
11. With the object-oriented (OO) approach, an object encapsulates, or_____.a programmer.
(a) carries out, the details of an object for
(b) hides, the details of an object from
(c) reveals, the details of an object to
(d) extends, the details of an object beyond
(e) None of these
12. Every computer connected to an intranet or extranet must have a distinct_____
(a) firewall
(b) proxy server
(c) IP address
(d) domain name
(e) None of these
13. A table of bits in which each row represents the distinct values of a key?
(a) Join index
(b) Bitmap index
(c) B + Tree
(d) Hierarchical index
(e) None of these
14. The degree of detail that should be incorporated into a database depends on what?
(a) Data integrity
(b) The type of database
(c) The user's perspective
(d) The business practices and policies
(e) None of these
15. The ___.converts digital signals to analog signals for the purpose of transmitting data over telephone
lines.
(a) Modem
(b) Router
(c) Gateway
(d) Bridge
(e) All of these
16. Before a package can be used in a java program it must be___.
(a) executed
(b) referenced
(c) imported
(d) declared
(e) None of these
17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the
will not be executed as an instruction___.
(a) begin the line with a # sign
(b) begin the line with double slashes (/ /)
(c) begin and end the line with double hyphens (-_-)
(d) indent the line
(e) None of these
18. Programming language built into user programs such as Word and Excel are known as____
(a) 4GLs
(b) macro languages
(c) object-oriented languages
(d) visual programming languages
(e) None of these
19. Firewalls are used to protect against___.
(a) Unauthorized Attacks
(b) Virus Attacks
(c) Data Driven Attacks
(d) Fire Attacks
(e) All of these
20. This is a standard way for a Web server to pass a Web user's request to an application program and
to receive data back to forward to the user-
(a) Interrupt request
(b) Forward DNS lookup
(c) Data-Link layer
(d) File Transfer Protocol
(e) Common gateway interface
21. Three SQL, DDL, CREATE commands are__.
(a) Schema, Base and Table
(b) Base, Table and Schema
(c) Key, Base and Table
(d) Schema, Table and View
(e) None of these
22. Data are ________ in client/server computing.
(a) never sent to the client machine
(b) sent in very large sections to save processing time
(c) sent only upon the client's request
(d) sent in complete copies for the client to filter and sort
(e) sent from the client to the server for processing
23. Which of the following will not eliminates the ambiguities of a null value?
(a) Define the attribute as required
(b) Define subtypes
(c) Define each attribute as having an initial value that is recognized as blank
(d) Define supertypes
(e) None of these
24. The____directory is mandatory for every disk.
(a) Root
(b) Base
(c) Sub
(d) Case
(e) None of these
25. This is a group of servers that share work and may be able to back each other up if one server fails.
(a) Channel bank
(b) Cluster
(c) Tiger team
(d) Serverless backup
(e) Logical unit
Answers -
1-a 14-b
2-c 15-a
3-e 16-c
4-b 17-b
5-b 18-c
6-e 19-a
7-d 20-e
8-a 21-d
9-c 22-c
10-c 23-d
11-b 24-a
12-c 25-b
13-a