Study Notes For All Competitive Exam
Study Notes For All Competitive Exam
MISCELLANEOUS
Q.1. Which class of IP address provides a Q.5. Which of the following devices is used to
maximum of only 254 host addresses per connect same network segments and
network ID? manage the traffic between them?
(1) Class E (1) Switch
(2) Class B (2) Hub
(3) Class C (3) Modem
(4) Class D (4) Repeater
(5) Class A (5) Bridge
Q.2. Which of the following devices translates Q.6. Which of the following network
hostnames into IP addresses? devices/systems translates data from one
(1) DNS Server format to another?
(2) Hub (1) DHCP Server
(3) DHCP Server (2) Hub
(4) Firewall (3) Gateway
(5) MAC (4) NIC
Q.3. Which of the following devices takes data (5) Switch
sent from one network device and forwards Q.7. Switch is a device of _________ Layer of
it to all devices on the network regardless of OSI Model.
the intended recipient?
(1) Network Layer
(1) Switch
(2) Data Link Layer
(2) DNS Server
(3) Application Layer
(3) Hub
(4) Session Layer
(4) Gateway
(5) None of these
(5) All
Q.8. HUB is a _________ Device and Switch is
Q.4. Which of the following devices takes data a ________ Device.
sent from one network device and forwards
(1) Unicast, Multicast
it to the destination node based on MAC
(2) Multicast, Unicast
address?
(3) Broadcast, Unicast
(1) Hub
(4) Unicast, Unicast
(2) Switch
(5) Multicast, Multicast
(3) Gateway
Q.9. Star Topology is based on a Central Device
(4) Modem
that can be __________.
(5) All
(1) HUB
Q.19. The most common communications devices Q.24. A subset of characters within a data field is
all use ___ transmission, a continuous known as
electrical signal in the form of a wave. (1) Record
(1) analog (2) File
(2) digital (3) Data string
(3) automatic (4) Byte
(4) all (5) None of these
(5) None of these Q.25. Data items grouped together for storage
Q.20. A (n) __________ adapter can move data at purposes are called-
128,000 bps, more than double a standard (1) Record
modem (2) Title
(1) Fax (3) List
(2) Dial-Up
(4) string
(3) Telephone modem
(5) None of these
(4) ISDN
Q.26. Which of the following terms does not
(5) None of these
describe a database structure used by a
Q.21. Which of the following is a type of DBMS
DBMS to link data from several files?
Software?
(1) Relational
(1) Data
(2) Structural
(2) My SQL
(3) Network
(3) MS-office
(4) All of the above
(4) utility
(5) None of these
(5) None of these
Q.27. The feature that database allows to access
Q.22. Which of the following is NOT a type of
only certain records in database is:
Microsoft Access database object?
(1) Forms
(1) Queries
(2) Reports
(2) Workbooks
(3) Queries
(3) Forms
(4) Tables
(4) Tables
(5) None of these
(5) None of these
Q.28. Set of permitted values of each attribute is
Q.23. The complete picture of data stored in
called ______.
database is known as
(1) Domain
(1) System flowchart
(2) Relation
(2) Schema
(3) Tuple
(3) record
(4) Schema
(4) DBMS
(5) None of these
(5) None of these
Q.29. The primary key must be ____. Q.35. Which operation is not permitted by query?
(1) Unique (1) delete
(2) Not null (2) entry
(3) Both 1 and 2 (3) Modify
(4) Either 1 or 2 (4) create table
(5) None of these (5) None of these
Q.30. Logical design of the database is called Q.36. Which is not related to database ?
______. (1) Table
(1) Database Snapshot
(2) Query
(2) Database Instance
(3) Form
(3) Database Schema
(4) Macro
(4) All of the above
(5) None of these
(5) None of these
Q.37. The language used by application
Q.31. Database utility exist in ——————
programs to request data from the DBMS
menu ?
is referred to the-
(1) Format
(1) DML
(2) tools
(2) DDL
(3) File
(3) query language
(4) Edit
(4) All of the above
(5) None of these
(5) None of these
Q.32. In which object sql is used ?
Q.38. COMMIT and ROLLBACK in DBMS are
(1) Query
the example of -
(2) Form
(1) DDL
(3) Report
(2) DML
(4) Macro
(3) TQL
(5) None of these
Q.33. What is the function of relationship ? (4) DQL
(1) Relate multiple table (5) None of these
(2) Relate multiple form Q.39. In Data base , properties of any entity are
(3) Relate table and form represented by its -
(4) Relate queries and forms (1) Setting
(5) None of these (2) Tuples
Q.34. What is there in record ? (3) Attributes
(1) Collection of field (4) Degree
(2) collection of Number (5) None of these
(3) Collection of rows Q.40. Type of a file is identified by -
(4) All of above (1) File
(5) None of these (2) Attribute
Q.98. Which of the following is not an example of (1) To protect a computer from
security and privacy risk ? unauthorized access
Q.106. An unauthorized user is a network _______ Q.111. A communication processor that connects
issue. dissimilar networks by providing the
translation from one set of protocol to
(1) Performance
another is—
(2) Reliability
(1) Modem
(3) Security
(2) Gateway
(4) Firewall
(3) Router
(5) None of these
(4) Bridge
Q.107. Which topology requires a central controller
(5) All of these
or hub?
Q.112. A group of computers and other devices
(1) Mesh
connected together is called________.
(2) Star
(1) Network
(3) Bus
(2) Intranet
(4) Ring
(3) Internetworking
(5) Tree
(4) Both 2 and 3
Q.108. Which topology requires a multipoint (5) Extranet
connection?
Q.113. Transmission Lines are also called
(1) Mesh as________.
(2) Star (1) Circuits
(3) Bus
Write us : [email protected] www.mahendras.org www.mahendraguru.com myshop.mahendras.org
STUDY NOTES FOR ALL COMPETITIVE EXAM
Q.115. The distance a simple signal can travel in (5) A network with more than one entry
one period is called ________. point.
(1) Wavelength Q.119. Which of the following services use TCP?
(2) Frequency (1) DHCP
(3) Propagation speed (2) SMTP
(4) Both 1 and 2 (3) FTP
(5) None of these (4) HTTP
Q.116. How many collision domains are created (5) 2, 3 and 4
when you segment a network with a 12-port Q.120. Which of the following terms is used to
switch? describe a hardware- or software-based
(1) 1 device that protects networks from outside
threats?
(2) 12
(3) 5 (1) NIC
Q.51.(4) the data types of all fields in all files, Q.74.(3) Modem
the names of all fields in all files and Q.75.(2) 2
the widths of all fields in all files Q.76.(1) Attenuation
Q.52.(2) Modify
Q.77.(2) Wireless
Q.53.(1) Each user can see only a small part of
Q.78.(5) Super computer
the entire database.
Multiple users who wish to access the Q.79.(1) Internet is example of connectivity.
Q.54.(2)
data Q.80.(4) Mesh
Q.55.(4) Independent of both hardware and Q.81.(3) Netware is an operating system, which
sofware. is developed by Novell.
Q.56.(2) Binary Q.82.(3) WAN
Q.57.(1) PROJECTION operation is used if we Q.83.(5) None of these
are interested in only certain columns To connect a computer over telephone
of a table. line, modem is required.
Q.58.(5) All are valid SQL data type.
Q.84.(1) No navigate shared computer and
Q.59.(1) The RDBMS terminology for a row is
folder in Network
Tuple.
Q.85.(2) Keyboard
Q.60.(4) Union, Intersection and difference
Q.61.(3) DDL stands for Data Definition Q.86.(1) Computer in network is work group.
Language. Q.87.(3) For an Ip Address to be valid, there
Q.62.(4) All are advantages of view. should be four numbers seperated by
Q.63.(1) External database level is closest to the dots, and every number must lie
users. between 0 to 255
Q.64.(2) Total and partial. Q.88.(4) Intranet
Q.65.(4) All the tuples of R1 and R2 which have Q.89.(3) Application layers
common columns. Q.90.(5) All are broad band communication
Q.66.(4) =, Like and Between are comparison channel.
operators in SQL. Q.91.(4) Cable
Q.67.(2) Aggregation is a process when relation
Q.92.(2) half-duplex
between two entities is treated as a
Q.93.(2) Senior Manage or Chief information
single entity.
security officer (CISO) of IT assurance
Q.68.(2) In an ER Diagram, ellipse with
manager who is in charge of
underlying lines is used to represent
information security.
Key attribute.
Q.69.(2) Foreign Key constraint is used to restrict Q.94.(2) Netwdork administrator
actions that would destroy links between Q.95.(1) Discrete value
tables. Q.96.(4) Bandwidth is the amount of data that
Q.70.(4) Total mumber of column in a table. can be transmitted along a channel
Q.71.(1) Network layer during a specified period of time.
Q.72.(5) None of these Q.97.(3) Dial-up
Q.73.(1) Physical layer Q.98.(2) Spam
Q.99.(3) A WAN uses long - distance Q.108.(3) Bus topology requires a multipoint
transmission media to link computers connection.
separated by distance. Q.109.(1) Local Area Network refer to a small,
Q.100.(3) Data Bus is NOT considered a network single-site network.
communications device. Q.110.(3) Computers connected to a LAN (Local
Q.101.(3) 202.50.20.148 Area Network) can share information
Q.102.(2) Twisted-pair wire of transmission and/ or share peripheral equipment.
media is known as regular telephone Q.111.(2) Gateway
wire. Q.112.(1) A group of computers and other
Q.103.(1) To protect a computer from devices connected together is called
unauthorized access Network.
Q.104.(2) Internet layer Q.113.(4) Transmission Lines are also called as
Q.105.(1) Guided Transmission Media circuits channels, or trunks
Q.106.(3) Security Q.114.(3) The Switching Elements are also
Q.107.(2) Star called as IMPs.
Q.115.(1) The distance a simple signal can travel
in one period is called wavelength.
Q.116.(2) 12
Q.117.(3) ICMP
Q.118.(1) A network that has only one entry and
exit point.
Q.119.(5) SMTP, HTTP and FTP use TCP.
Q.120.(3) Firewall