0% found this document useful (0 votes)
35 views24 pages

Introduction To Computer Systems and Network: Exam Revision Questions

The document contains a series of exam revision questions focused on computer systems, operating systems, and utility programs. It covers topics such as the functions of system software, the role of the CPU, types of networks, and the purpose of various utility programs. Each question is presented with multiple-choice answers to assess understanding of the material.

Uploaded by

gzcbrsbr82
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views24 pages

Introduction To Computer Systems and Network: Exam Revision Questions

The document contains a series of exam revision questions focused on computer systems, operating systems, and utility programs. It covers topics such as the functions of system software, the role of the CPU, types of networks, and the purpose of various utility programs. Each question is presented with multiple-choice answers to assess understanding of the material.

Uploaded by

gzcbrsbr82
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

Exam

Revision Questions
Introduction to Computer Systems and
Network
1. What is the main function of System Software in a computer system?

● A) To allow users to play games


● B) To control and manage hardware and software resources
● C) To store personal data
● D) To edit text documents

2. Which of the following is an example of system software?

● A) Web browser
● B) Antivirus software
● C) Operating system
● D) Word processor

3. What does a computer system's processor (CPU) do?

● A) It stores files and documents


● B) It processes data and executes instructions
● C) It provides a graphical interface
● D) It supplies power to the computer

4. Which part of a computer is considered the "brain" of the system?

● A) Hard drive
● B) Monitor
● C) Central Processing Unit (CPU)
● D) Keyboard

5. What is a computer network?

● A) A collection of websites
● B) A group of connected computers that share resources
● C) A method to store data
● D) A device that processes data
6. What is the purpose of a Local Area Network (LAN)?

● A) To connect computers across the world


● B) To connect a small group of computers in one location
● C) To store data in the cloud
● D) To provide wireless internet access globally

7. Which of the following is a task performed by the processor?

● A) Receiving input from the keyboard


● B) Fetching and executing instructions
● C) Displaying images on the monitor
● D) Providing power to the system

10. What happens if there is no operating system on a computer?

● A) The computer will turn on but not function properly


● B) The computer will not turn on at all
● C) The computer will still run programs as usual
● D) The computer will only display the image

13. Which of the following is true about system software?

● A) It helps users write documents


● B) It manages the computer’s hardware and runs application programs
● C) It is optional for a computer to function
● D) It refers to games and other entertainment programs

14. What is the primary role of an operating system (OS)?

● A) To run games and entertainment programs


● B) To manage files and folders
● C) To control hardware resources and allow software to run
● D) To provide internet connectivity

17. What is the difference between hardware and software in a computer system?

● A) Hardware is the physical components, while software is the programs and instructions
● B) Hardware refers to external devices, and software is stored on USB drives
● C) Software is tangible, while hardware is not
● D) There is no difference between hardware and software

18. What type of network connects computers in different cities or countries?

● A) Local Area Network (LAN)


● B) Personal Area Network (PAN)
● C) Wide Area Network (WAN)
● D) Home Area Network (HAN)

19. Which of the following is the purpose of the memory in a computer system?

● A) To permanently store data for future use


● B) To temporarily hold data and instructions being processed
● C) To display information to the user
● D) To provide power to the computer system

Tasks Are Carried Out by the Operating


System
1. What is the primary role of an operating system?

● A) To design hardware components


● B) To manage hardware resources and allow software to run
● C) To provide power to the system
● D) To connect the computer to the internet

2. Which of the following is a task performed by an operating system?

● A) Writing documents
● B) Managing memory and processor time
● C) Installing hardware components
● D) Designing software applications

3. How does an operating system manage hardware devices?

● A) By directly controlling the devices


● B) By acting as an intermediary between applications and the hardware
● C) By running the hardware's built-in software
● D) By disconnecting non-essential devices

4. Which of the following is an example of an operating system managing


storage?

● A) Organizing files and folders on the hard drive


● B) Running an antivirus program
● C) Compressing files for backup
● D) Displaying images on the monitor
5. What does an operating system do when multiple programs are running
at the same time?

● A) It crashes the system


● B) It allows only one program to run
● C) It manages processor time through multitasking
● D) It slows down the computer

6. How does an operating system manage memory?

● A) By allocating memory to running programs and freeing it when no longer


needed
● B) By storing programs permanently
● C) By compressing data in memory
● D) By copying data between RAM and ROM

7. Which task is performed by the operating system to manage


applications?

● A) It automatically creates new applications


● B) It allocates resources to run the applications and terminates them when
finished
● C) It stores applications permanently on the disk
● D) It updates applications automatically

8. What is the function of a file system in an operating system?

● A) It creates new hardware devices


● B) It organizes and manages how data is stored and retrieved on storage devices
● C) It controls network settings
● D) It compresses data automatically

9. Which of the following is an example of the operating system handling


files?

● A) Copying, renaming, and deleting files


● B) Connecting to the internet
● C) Running a web browser
● D) Installing drivers

10. What is the purpose of device drivers in an operating system?

● A) To allow the operating system to communicate with hardware devices


● B) To store data on external devices
● C) To update the operating system
● D) To increase system performance
12. How does an operating system handle system security?

● A) By managing user permissions and providing security features like firewalls


● B) By installing antivirus software automatically
● C) By storing files in encrypted format only
● D) By preventing external devices from connecting to the system

14. What happens if the operating system's memory management fails?

● A) Programs may crash or the system may freeze


● B) New files cannot be created
● C) The computer will automatically reboot
● D) The processor will stop working

15. Which of the following is NOT a task of the operating system?

● A) Managing hardware resources


● B) Designing software applications
● C) Handling file storage and retrieval
● D) Running programs in the background

16. How does the operating system control user access to files and
applications?

● A) It automatically creates a backup of user files


● B) It manages user accounts and permissions
● C) It encrypts all files on the system
● D) It deletes old user accounts automatically

18. What does an operating system do to ensure applications run smoothly


without interfering with each other?

● A) It manages processes by allocating CPU time to each application


● B) It runs all applications in sequence, one after the other
● C) It disables unused applications
● D) It prioritizes graphical applications over text-based ones

19. Which of the following features allows the operating system to detect
and fix file system errors?

● A) Firewall
● B) Antivirus software
● C) Disk management utilities
● D) Task manager

20. How does an operating system manage network connections?

● A) It prevents all network traffic for security reasons


● B) It controls data transmission between the computer and network devices
● C) It disconnects devices when not in use
● D) It automatically detects and removes viruses from network traffic

Utility programs including drivers,


security software, and defragmentation.
1. What is the primary function of utility programs in a computer system?

● A) To create new hardware devices


● B) To perform maintenance tasks that optimize and protect the system
● C) To write software applications
● D) To replace the operating system

2. Which of the following is an example of a utility program?

● A) Web browser
● B) Disk defragmentation
● C) Word processor
● D) Video editing software

3. What is the role of device drivers in a computer system?

● A) To allow the operating system to communicate with hardware devices


● B) To increase the speed of the processor
● C) To update the operating system automatically
● D) To store files permanently

4. What does a defragmentation tool do in a computer system?

● A) It deletes unnecessary files


● B) It cleans the computer's registry
● C) It reorganizes scattered data on the hard drive to improve performance
● D) It compresses files to save space

5. Which of the following is an example of security software?


● A) Web browser
● B) Antivirus program
● C) Disk partitioning tool
● D) Graphics card driver

6. What is the main purpose of antivirus software?

● A) To organize files on the computer


● B) To detect and remove malware from the system
● C) To enhance system speed
● D) To defragment the hard drive

7. Why are utility programs like firewalls important?

● A) They help improve the graphical quality of games


● B) They monitor and block unauthorized access to the network
● C) They increase the speed of the internet connection
● D) They are used to install new drivers

8. What does a disk cleanup utility do?

● A) It defragments the hard drive


● B) It removes unnecessary files to free up space
● C) It repairs damaged files
● D) It backs up important data

9. Which of the following is an example of a file management utility?

● A) Graphics editing software


● B) File compression tool (e.g., WinZip)
● C) Web development tool
● D) Media player

10. Why is defragmentation important for maintaining a computer’s


performance?

● A) It deletes duplicate files


● B) It updates the operating system
● C) It reorganizes fragmented data to speed up file access
● D) It scans for viruses

11. Which of the following is true about device drivers?

● A) They are used to store files


● B) They ensure the correct operation of hardware devices
● C) They monitor system performance
● D) They defragment the hard drive

12. What task does a backup utility perform?

● A) It removes temporary files


● B) It creates copies of important files to prevent data loss
● C) It scans for malware
● D) It manages network traffic

13. Which utility program helps protect a computer from unauthorized


access?

● A) Disk defragmenter
● B) Firewall
● C) File manager
● D) Disk cleanup tool

14. What does a software update utility do?

● A) It speeds up the computer's processor


● B) It keeps programs and the operating system up to date with the latest versions
and security patches
● C) It removes viruses from the system
● D) It deletes temporary files

15. What is the main role of a firewall in a computer system?

● A) To delete files from the system


● B) To monitor and control incoming and outgoing network traffic based on
security rules
● C) To organize files on the hard drive
● D) To defragment the disk

16. Which utility program is responsible for scanning and removing


malware?

● A) Disk cleanup tool


● B) Antivirus software
● C) Device drivers
● D) Defragmentation tool

18. Why is it important to regularly use security software like antivirus?

● A) It speeds up the computer


● B) It protects the computer from malware, viruses, and other security threats
● C) It updates the operating system
● D) It organizes files on the system

19. How does a file compression utility help in managing storage space?

● A) It removes large files


● B) It reduces the size of files to save space
● C) It deletes temporary files
● D) It organizes files into folders

20. What is the main benefit of using a system monitoring utility?

● A) It defragments the hard drive


● B) It monitors the system's performance and provides data on CPU, memory, and
network usage
● C) It cleans unnecessary files
● D) It installs new applications

Computer store list of instructions to


be run one at a time
1. What is the term used to describe a set of instructions stored in a
computer that is run one at a time?

● A) Algorithm
● B) Program
● C) Data
● D) Hardware

2. How does a computer process instructions from a program?

● A) It runs all instructions simultaneously


● B) It executes instructions one at a time, in sequence
● C) It ignores the order of instructions
● D) It randomly selects instructions to execute

3. Where are instructions stored before they are executed by the


computer’s processor?

● A) In the computer’s memory (RAM)


● B) On the hard drive
● C) In the processor
● D) In the power supply
4. What happens when the processor finishes executing an instruction?

● A) It turns off the computer


● B) It saves the instruction permanently
● C) It fetches the next instruction from memory
● D) It deletes the previous instruction

6. What is the role of the Control Unit in the CPU when running
instructions?

● A) It directs the sequence of operations by fetching, decoding, and executing


instructions
● B) It stores the instructions permanently
● C) It manages input and output devices
● D) It displays the results on the monitor

7. Why must computers execute instructions one at a time?

● A) To ensure that each operation is completed correctly before the next begins
● B) To prevent memory overload
● C) To save power
● D) To run multiple programs at once

8. What is the cycle called in which the CPU fetches, decodes, and
executes instructions?

● A) Storage cycle
● B) Fetch-Decode-Execute cycle
● C) Memory cycle
● D) Boot cycle

9. What would happen if the CPU did not follow the correct sequence of
instructions?

● A) The program would not run properly and may crash


● B) The computer would run faster
● C) The system would ignore the error
● D) The program would be executed twice

10. Where does the CPU get its list of instructions to execute?

● A) From the internet


● B) From the computer’s memory (RAM)
● C) From the monitor
● D) From external devices
11. What is the name of the part of the computer responsible for running
instructions?

● A) Random Access Memory (RAM)


● B) Central Processing Unit (CPU)
● C) Hard Drive
● D) Graphics Card

12. How does the CPU know which instruction to run next?

● A) It chooses randomly
● B) It asks the user
● C) It follows the order in the program’s instruction list
● D) It waits for an error to occur

16. What happens to the list of instructions after a program is completed?

● A) It remains in the CPU


● B) It is cleared from the memory (RAM)
● C) It is stored permanently on the hard drive
● D) It is saved to an external device

Fetch-Decode-Execute (FDE) Cycle


1. What is the first stage of the Fetch-Decode-Execute (FDE) cycle?

● A) Fetch
● B) Decode
● C) Execute
● D) Store

2. During the fetch stage, what is retrieved by the CPU?

● A) The next instruction from memory (RAM)


● B) The result of the last operation
● C) Data from an external device
● D) A program from the hard drive

3. What is the purpose of the decode stage in the FDE cycle?

● A) To store the result of an operation


● B) To interpret the instruction and prepare it for execution
● C) To copy data to the hard drive
● D) To display the instructions on the monitor
4. Which part of the CPU is responsible for decoding the instruction during
the FDE cycle?

● A) Arithmetic Logic Unit (ALU)


● B) Control Unit (CU)
● C) Cache
● D) Memory Address Register (MAR)

5. What happens during the execution stage of the FDE cycle?

● A) The CPU retrieves the next instruction


● B) The CPU carries out the decoded instruction
● C) The CPU saves the instruction to memory
● D) The CPU waits for the user's input

11. What happens if the instruction being executed is a branch instruction?

● A) The CPU ignores the instruction


● B) The CPU halts the FDE cycle
● C) The program counter is updated to point to a different memory location
● D) The instruction is executed twice

12. Which of the following happens during the Fetch stage of the FDE
cycle?

● A) The instruction is copied from memory into the CPU


● B) The instruction is executed
● C) The CPU performs arithmetic calculations
● D) The result is stored in the memory

15. What is the result of the execute stage in the FDE cycle?

● A) The action specified by the instruction is carried out (e.g., data manipulation,
arithmetic operation)
● B) The instruction is stored back in memory
● C) The CPU enters a rest state
● D) The program counter is cleared

19. In the FDE cycle, what does the term "fetch" refer to?

● A) Retrieving the next instruction from memory


● B) Carrying out an operation
● C) Decoding the instruction into signals
● D) Storing data back into memory

20. How does the CPU know when to stop the FDE cycle?
● A) When all instructions are fetched
● B) When the decode stage fails
● C) When it encounters a special instruction (e.g., halt or stop)
● D) When the memory is full

Scalability factors that should be


considered when designing networks
1. What does the term "scalability" refer to in network design?

● A) The speed of the network


● B) The capacity to be changed in size or scale
● C) The security of the network
● D) The type of cables used in the network

2. Which of the following factors can affect the scalability of a network?

● A) Distance and amount of data to be transmitted


● B) Type of operating system
● C) Size of the server
● D) Color of the cables

3. How can the impact of distance on network scalability be mitigated?

● A) By using faster processors


● B) By using signal boosters or ethernet cables
● C) By increasing the number of servers
● D) By using cheaper hardware

4. Why is it important to ensure network scalability?

● A) To reduce the cost of hardware


● B) To ensure the network can grow and handle more data over time
● C) To improve the quality of the internet connection
● D) To reduce the number of users on the network

5. What is the role of a signal booster in a network?

● A) It amplifies the signal to allow devices further away to connect


● B) It speeds up data processing in the CPU
● C) It secures the data being transmitted
● D) It stores additional network data

6. Which of the following can improve a weak wireless signal in a network?


● A) Adding a signal booster
● B) Replacing the hard drive
● C) Lowering the bandwidth
● D) Disconnecting other devices

7. What is the role of a router in a network?

● A) To secure the network from hackers


● B) To receive and forward data, connecting the network to the internet
● C) To store data permanently
● D) To increase the bandwidth of the network

8. Why might a signal booster be needed in a network?

● A) To increase the download speed of the network


● B) Because the signal does not reach far enough or obstacles are in the way
● C) To lower the cost of network maintenance
● D) To improve the visual quality of web pages

9. Which of the following is a potential cost factor when designing a


network?

● A) Speed of the processor


● B) Operating system version
● C) Adding Wi-Fi boosters or cables to extend the network
● D) The colour of the cables used

10. What is one reason Wi-Fi might be cheaper than a wired network?

● A) New devices can be added without needing additional cables


● B) Wi-Fi requires fewer security protocols
● C) Wi-Fi networks have unlimited bandwidth
● D) Wi-Fi does not need routers

11. How can data transmission be managed in large networks?

● A) By using one large transmission route


● B) By splitting the network into smaller areas with separate transmission media
● C) By reducing the number of devices on the network
● D) By limiting the number of files transmitted

12. How can bandwidth limitations affect network scalability?

● A) It increases the network’s speed


● B) It may require creating additional networks as the system grows
● C) It reduces the security of the network
● D) It speeds up data transmission

13. What is a potential security risk when designing a Wi-Fi network?

● A) Too many users on the network


● B) Data being intercepted due to open wireless access
● C) Overuse of cables
● D) Having multiple signal boosters

14. Which of the following items requires the highest level of security
during transmission?

● A) Log-in details for a bank account


● B) A social media post
● C) A video being downloaded
● D) An email with homework attached

Implementing Network Security:


1. What is the primary purpose of network security?

● A) To increase the speed of the network


● B) To protect data, systems, and networks from unauthorized access, attacks, or
damage
● C) To improve the graphics quality of websites
● D) To reduce the cost of hardware

2. Which of the following is a key factor to consider when implementing


network security?

● A) Color of network cables


● B) Accessibility, cost, and data sensitivity
● C) Size of the monitor
● D) Number of devices connected to the network

3. What is the trade-off between security and accessibility in network


design?

● A) More security always improves accessibility


● B) The more secure a system, the harder it might be to access
● C) Security does not affect accessibility
● D) Increased accessibility makes systems more secure
4. What is the role of firewalls in network security?

● A) To store data on the network


● B) To filter incoming and outgoing traffic as the first line of defence
● C) To increase the speed of data transmission
● D) To manage user passwords

5. How does encryption help secure a network?

● A) It converts data into a coded format to prevent unauthorized access


● B) It removes viruses from the system
● C) It filters network traffic
● D) It stores data on external drives

6. Which of the following is a benefit of using a Virtual Private Network


(VPN)?

● A) It encrypts internet connections for secure remote access


● B) It increases the bandwidth of the network
● C) It speeds up data processing in the CPU
● D) It secures files on a local computer

7. What is the function of Access Control Lists (ACLs) in network security?

● A) To boost the internet connection speed


● B) To define permissions for who can access specific resources in a network
● C) To encrypt data in storage
● D) To reduce the cost of maintaining a network

8. Which type of data would require the highest level of security measures?

● A) Social media posts


● B) Financial or healthcare records
● C) Publicly available data
● D) General business emails

9. What does multi-factor authentication provide in terms of network


security?

● A) Faster access to the network


● B) Stronger authentication by requiring multiple forms of verification
● C) Automatic encryption of all data
● D) Unlimited access to network resources

10. What is the primary role of antivirus software in network security?


● A) To encrypt data
● B) To protect systems from malicious attacks
● C) To manage network traffic
● D) To control user access to resources

11. How does a Virtual Private Network (VPN) protect remote users?

● A) It encrypts their internet connection and hides their IP address


● B) It prevents unauthorized software installations
● C) It stores data on remote servers
● D) It speeds up the internet connection

12. What type of data would require basic security measures like firewalls
and antivirus software?

● A) Low-sensitivity data, such as general business information


● B) Financial records
● C) Healthcare information
● D) Bank account logins

Network Topology:
Bus, Star, and Ring
1. What is a network topology?

A) The physical layout/arrangement of devices in a network


B) The software used to manage network traffic
C) A method to secure data in a network
D) The speed at which data is transmitted in a network

Answer: A) The physical layout of devices in a network

2. In a bus topology, how are the devices connected?

A) All devices are connected to a single central device


B) Devices are connected in a closed loop
C) Devices are connected to a single central cable
D) Devices are connected wirelessly

Answer: C) Devices are connected to a single central cable

3. Which of the following is a characteristic of a ring topology?


A) Each device is connected to every other device
B) All devices are connected to a central hub
C) Data travels in one direction around a closed loop
D) Data is transmitted randomly to all devices

Answer: C) Data travels in one direction around a closed loop

4. What happens if the central hub fails in a star topology?

A) Only one device loses connection


B) The entire network is disrupted
C) Data is rerouted automatically
D) Only the hub will need to be replaced

Answer: B) The entire network is disrupted

5. Which topology has the advantage of being simple to install but is


prone to data collisions?

A) Bus topology
B) Ring topology
C) Star topology
D) Mesh topology

Answer: A) Bus topology

6. Which of the following is an advantage of the star topology?

A) It is more cost-effective than other topologies


B) It offers high fault tolerance as each device is independently connected
C) It requires fewer cables than other topologies
D) It allows for faster communication between devices than a bus topology

Answer: B) It offers high fault tolerance as each device is independently connected

7. What is the disadvantage of the bus topology?

A) It requires a lot of cabling


B) It is difficult to add new devices
C) It has low data collision rates
D) If the main cable fails, the entire network fails

Answer: D) If the main cable fails, the entire network fails

8. How does a ring topology handle data transmission?


A) Data is sent directly from one device to another without interruption
B) Data travels in both directions around the loop
C) Data travels in one direction, and each device passes it along until it reaches the destination
D) Data is broadcast to all devices at once

Answer: C) Data travels in one direction, and each device passes it along until it reaches the
destination

9. Which of the following is a key disadvantage of a star topology?

A) High cost due to the use of a central hub


B) Low fault tolerance because all devices share the same connection
C) Slow data transfer rates
D) Difficulty in troubleshooting network issues

Answer: A) High cost due to the use of a central hub

10. What is the advantage of a ring topology over a bus topology?

A) It is easier to add new devices


B) It has no data collisions, making it more efficient
C) It uses fewer cables than a bus topology
D) It is more reliable in case of a central device failure

Answer: B) It has no data collisions, making it more efficient

Understanding the Role of Parity Bits


in Error Detection
1. What is the primary purpose of a parity bit?
A. To increase the speed of data transmission
B. To compress data for storage
C. To detect errors in data transmission
D. To encrypt data for security

Answer: C. To detect errors in data transmission

2. In even parity, what happens if the total number of 1s in the data and parity bit is odd?
A. Data is accepted as correct
B. A parity bit is added to make the total even
C. Data is compressed to remove the extra 1s
D. No action is taken
Answer: B. A parity bit is added to make the total even

3. Which type of parity requires the total number of 1s, including the parity bit, to be odd?
A. Even parity
B. Odd parity
C. Error parity
D. Reverse parity

Answer: B. Odd parity

4. If a parity bit is used and an error occurs during data transmission, what is the main
limitation of parity error detection?
A. It cannot detect any errors
B. It can only detect errors but cannot correct them
C. It can correct errors but not detect them
D. It adds significant delays in transmission

Answer: B. It can only detect errors but cannot correct them

5. How does a parity bit detect an error in a transmitted data packet?


A. By comparing the transmitted and received data bits
B. By checking if the total number of 1s matches the parity rule (even or odd)
C. By performing a checksum operation
D. By using encryption to verify data integrity

Answer: B. By checking if the total number of 1s matches the parity rule (even or odd)

6. What type of errors can a single parity bit detect?


A. Single-bit errors only
B. Multiple-bit errors only
C. Both single-bit and multiple-bit errors
D. No errors at all

Answer: A. Single-bit errors only

7. Which of the following is a major disadvantage of parity bits in error detection?


A. They require complex hardware
B. They cannot detect multiple-bit errors
C. They reduce the reliability of the data
D. They increase data transmission time significantly

Answer: B. They cannot detect multiple-bit errors

8. If a system uses even parity and a data packet contains the bits 1011011, what would
be the parity bit?
A. 0
B. 1
C. 2
D. Cannot be determined

Answer: A. 0 (The total number of 1s in 1011011 is 5. To make it even, a parity bit of 0 is


added.)

The Role of Protocols in Transmitting


Data, Including TCP/IP and HTTP
1. What is the primary role of a protocol in data transmission?
A. To provide encryption for secure communication
B. To define rules and standards for data exchange between devices
C. To compress data for faster transmission
D. To control the hardware of the network

Answer: B. To define rules and standards for data exchange between devices

2. Which of the following is a fundamental function of the TCP/IP protocol?


A. Securing data with encryption
B. Managing hardware devices
C. Breaking data into packets and ensuring their reliable delivery
D. Compressing data to save bandwidth

Answer: C. Breaking data into packets and ensuring their reliable delivery

3. What does HTTP stand for?


A. Hyper Text Transfer Protocol
B. High Transmission Technology Protocol
C. Host Transmission Transport Protocol
D. Hyperlink Transfer Technology Protocol
Answer: A. Hyper Text Transfer Protocol

4. Which protocol is primarily used to access web pages over the internet?
A. FTP
B. SMTP
C. HTTP
D. SNMP

Answer: C. HTTP

5. How does TCP ensure reliable data transmission?


A. By encrypting all data packets
B. By confirming the receipt of each packet and retransmitting lost packets
C. By compressing data to reduce transmission time
D. By using shorter data packets

Answer: B. By confirming the receipt of each packet and retransmitting lost packets

6. What is the relationship between TCP and IP in the TCP/IP protocol suite?
A. TCP handles hardware communication, while IP handles software communication
B. TCP manages application data, while IP handles addressing and routing packets
C. TCP encrypts data, while IP ensures secure delivery
D. TCP and IP are identical protocols with no distinct roles

Answer: B. TCP manages application data, while IP handles addressing and routing packets

7. What does the term "stateless protocol" mean in the context of HTTP?
A. HTTP cannot transmit data
B. HTTP does not retain information about previous requests
C. HTTP encrypts every data packet independently
D. HTTP requires a continuous connection between client and server

Answer: B. HTTP does not retain information about previous requests

8. Which layer of the TCP/IP model does the HTTP protocol operate at?
A. Network layer
B. Transport layer
C. Application layer
D. Data link layer
Answer: C. Application layer

9. What is a key difference between HTTP and HTTPS?


A. HTTPS is faster than HTTP
B. HTTPS uses encryption to secure data, while HTTP does not
C. HTTP is used for email, while HTTPS is used for websites
D. HTTPS operates on the network layer, while HTTP operates on the transport layer

Answer: B. HTTPS uses encryption to secure data, while HTTP does not

10. Which protocol in the TCP/IP suite is responsible for ensuring packets are routed to
the correct destination?
A. TCP
B. HTTP
C. IP
D. FTP

Answer: C. IP

11. Why is the TCP/IP model important for internet communication?


A. It encrypts all internet traffic
B. It standardizes the process of transmitting data over the internet
C. It provides faster network speeds than other protocols
D. It ensures that data packets are compressed for efficient transmission

Answer: B. It standardizes the process of transmitting data over the internet

Machine Learning and Industry 4.0


1. What is the primary focus of Industry 4.0?
A. Manual labour-intensive production processes
B. Integration of advanced digital technologies in manufacturing
C. Minimizing automation in industrial settings
D. Increasing fossil fuel consumption in industries

Answer: B. Integration of advanced digital technologies in manufacturing

2. Which of the following is an example of Machine Learning in Industry 4.0?


A. Robots performing repetitive tasks without adaptation
B. A system that learns from production data to optimize efficiency
C. A factory that exclusively relies on human workers
D. Manual scheduling of production tasks

Answer: B. A system that learns from production data to optimize efficiency

3. What role does Machine Learning play in predictive maintenance?


A. Predicting the design of new machines
B. Analyzing data to forecast when a machine might fail
C. Automating repairs without human intervention
D. Reducing the need for maintenance entirely

Answer: B. Analyzing data to forecast when a machine might fail

4. How does Machine Learning contribute to quality control in manufacturing?


A. By replacing all workers with robots
B. By identifying defects in products through automated data analysis
C. By increasing production speed regardless of quality
D. By manually inspecting every product

Answer: B. By identifying defects in products through automated data analysis

You might also like