0

Information Technology Test

Description: Information Technology Mix Test - 2
Number of Questions: 25
Created by:
Tags: Information Technology Mix Test - 2 OOPs Data Communication & Networks Databases Ecommerce
Attempted 0/25 Correct 0 Score 0

Which of the following is a UTP connector?

  1. RJ- 45

  2. BNC

  3. HFOAs

  4. None of the above


Correct Option: A
Explanation:

The standard connector for unshielded twisted pair cabling is a RJ-45 connector. This is a plastic connector that looks like a large telephone-style connector.

Which of the following is a coaxial cable connector?

  1. HFOC's

  2. MT-RJ

  3. BNC

  4. RJ-45


Correct Option: C
Explanation:

The most common type of connector used with coaxial cables is the Bayone-Neill-Concelman (BNC) connector. Different types of adapters are available for BNC connectors, including a T-connector, barrel connector and terminator. Connectors on the cable are the weakest points in any network.

Which of the following is the shortest frame in the HDLC protocol?

  1. Information frame

  2. Supervisory frame

  3. Management frame

  4. Numbered frame


Correct Option: B
Explanation:

It is the shortest frame which consists of flag, address, control, FCS and it carries commands and responses.

Which cable is commonly used for cable TV?

  1. Coaxial cable

  2. Fiber optic

  3. UTP

  4. All of the above


Correct Option: A
Explanation:

Coaxial cabling has a single copper conductor at its centre. A plastic layer provides insulation between the centre conductor and a braided metal shield. The metal shield helps to block any outside interference, therefore we use it in CABLE TV. Thin coaxial cable is known as thinnet (10base2). The most common ones are RG 59(Coaxial cable) and a low loss cable is RG 6, both are 72 ohm for TV sets and antennas.

Which protocol is used for uploading and downloading content or files?

  1. SFTP

  2. FTP

  3. TFTP

  4. All of the above


Correct Option: D
Explanation:

 FTP, SFTP and TFTP are used for transferring files from one system to another through internet and web server. FTP  is a standard network protocol used to copy a file from one host to another over a TCP -based network, such as the Internet. The SSH File Transfer Protocol is not related to FTP except that it also transfers files and has a similar command set for users. A similar protocol TFTP (Trivial File Transfer Protocol) provides connectionless file transfer over UDP.This is only suitable for very small files; for example, uploading configuration files to routers. 

In TCP checksum, ___ field is used for error detection.

  1. 32 bits

  2. 16 bits

  3. 4 bits

  4. 6 bits


Correct Option: B
Explanation:

The checksum field is the 16 bit one's complement sum of all 16 bit words in the header and text. If a segment contains an odd number of header and text octets to be checksummed, the last octet is padded on the right with zeros to form a 16 bit word for checksum purposes. The source port and destination port also have 16 bits.

How can we classify the DNS name space on the internet?

  1. In flat and centralized manner

  2. In flat and distributed manner

  3. In hierarchical and cenralized manner

  4. In hierarchical and distributed manner


Correct Option: D
Explanation:

Domain name system is hierarchical (cs.uktech.gov.in) (Uttrakhand technical University in India ) and distributed (systems are connected to the network). So, this convention should work every where.

______________ function scans for the strings for the last occurrence of the characters.

  1. Strlen()

  2. Strchar()

  3. Strchr()

  4. None of the above


Correct Option: B
Explanation:

It is strchr() not a strchar(). There is no such function called strchar().

How can we achieve security in the network?

  1. Firewall security

  2. Cryptography

  3. NAT

  4. All of the above


Correct Option: D
Explanation:

This is the correct option. 

What is needed to interconnect two homogeneous WANs?

  1. Repeater

  2. Bridge

  3. Router

  4. NIC


Correct Option: C
Explanation:

Router is used to connect two WANs. Router works in Network layer. So, WANs of different protocols are supported by router.

If there are different users, how can we employ multi-access in GSM?

  1. By using handsets

  2. By dividing time slots

  3. By using band pass filters

  4. None of the above


Correct Option: C
Explanation:

In Multi-access system in Global Mobile system, each user has different band pass filter to send or receive the data.

Base station and MSC relate to

  1. ISO-OSI Model

  2. Cellular radio

  3. ARPANET structure

  4. None of the above


Correct Option: B
Explanation:

Base station and Mobile Switching Centers (MSC) are related to radio relays. The BSC may be coupled to a mobile switching center (MSC) and a packet data serving node (PDSN) between MSCs, circuit connections provide the handover mechanism which services calls as users roam from one service zone to another.

ISAM is a ______________ class of data model.

  1. logical

  2. object-based

  3. record-based

  4. physical


Correct Option: D
Explanation:

Physical data model provides the concepts about physical storage of data.

Dr. E.F Codd introduced the _____________ data model.

  1. hierarchical

  2. physical

  3. relational

  4. network


Correct Option: C
Explanation:

In relational model, both entity and relationships are represented as tables.

_____________ level in tree scheme architecture is concerned of abstraction defining the structure of the complete database and logical relationships that exists among data.

  1. Conceptual

  2. External

  3. Internal

  4. Hierarchical


Correct Option: A
Explanation:

Conceptual level is responsible for tree structure and logical relationship that exists among data.

____________ performs transactions of DDL statements into schema definition.

  1. SQL Query Compiler

  2. DDL Compiler

  3. DML Compiler

  4. SQL Pre-Compiler


Correct Option: B
Explanation:

It performs translations of DDL statements into schema definition called meta data in the DBMS catalog.

____________ index can be defined on non key ordering field of a file of records such that number records can have same value for the ordering field.

  1. Primary

  2. Sparse

  3. Clustering

  4. Dense


Correct Option: C
Explanation:

Clustering index file consists of entries with two fields - the clustering field value and the block pointer to clustered block of records.

____________ protocol offers security techniques and encryption with RSA methods along with other payment protocols.

  1. HTTP

  2. S-HTTP

  3. FTP

  4. SSL


Correct Option: B
Explanation:

S-HTTP allows the client and servers to execute all encryption and decryption of transactions.

__________ assumes that the card holder and merchant have been communicating in order to negotiate terms of a purchase and generate an order.

  1. FTP

  2. SSL

  3. SEPP

  4. S-HTTP


Correct Option: C
Explanation:

It is an open, vendor-neutral, non-proprietary, license free specification for securing on-line transactions.

SATAN (Security Administration Tool for Analyzing Networks) is a __________ program that checks both local and remote hosts for network vulnerabilities.

  1. DOS

  2. UNIX

  3. Macintosh OS

  4. Windows XP


Correct Option: B
Explanation:

UNIX provides far more security to host and remote host as compared to any OS available nowdays.

Mapping from MAC address to IP address is done by __________protocol.

  1. ARP

  2. SNMP

  3. RARP

  4. SMTP


Correct Option: C
Explanation:

It is used to match the MACC (physical address) of a system to the logical (IP) address. This is used for a diskless computer.

_________ is a standard protocol developed for secure credit card transactions over insecure networks.

  1. HTTP

  2. FTP

  3. SET

  4. Telnet


Correct Option: C
Explanation:

SET protocol has developed a single method that consumers and merchants use to conduct bank card transactions in cyberspace as securely and easily as they do in retail stores today.

On which layer do bridges recognize the addresses?

  1. 1

  2. 3

  3. 2

  4. All of the above


Correct Option: C
Explanation:

Bridges operate in both physical and datalink layers. So, the layer supports a data link layer (layer 2). Bridges work at the Data Link Layer of the OSI model because they work at this layer, all information contained in the higher levels of the OSI model is unavailable to them. Therefore, they do not distinguish between one protocol and another.

What will be the value of idle state of line in synchronous transmission?

  1. 0

  2. 1

  3. Opposite of the last value

  4. None of these


Correct Option: B
Explanation:

1 is an idle value of state of line in synchronous transmission.

For which purpose is sliding window technique used for?

  1. Error control

  2. Reliable in-order delivery of packets

  3. Flow of control

  4. Both (2) and (3)


Correct Option: D
Explanation:

Both 2nd and 3rd options are correct because sliding window is used for both flow control and protocols where reliable in-order delivery of packets is required, such as in the Data Link Layer (OSI model) as well as in the TCP.

- Hide questions