2nd puc computer science chapter 15 mcq

2nd puc computer science chapter 15 mcq questions,2nd puc computer science chapter 15 mcq online test,2nd puc computer science chapter 15 mcq pdf,2nd puc computer science chapter 15 multiple choice questions,2nd puc computer science chapter 15 multiple choice questions and answers,2nd puc computer science mcq questions,2nd puc computer science mcq with answers pdf,2nd puc computer science multiple choice questions,

1. UDP stands for ________.





ANSWER= B) User Datagram Protocol

2. HTTP stands for _________.





ANSWER= A) Hyper Text Transfer Protocol

3. URL stands for _______.





ANSWER= B) Uniform Resource Locator

4. _________ is the process of efficiently selecting a path in a network along which the data packets will travel their destination.





ANSWER= A) Routing

5. Most commonly used transmission media in wireless networks are.





ANSWER= D) All of these

6. _______ is a device that connects dissimilar networks.





ANSWER= A) Gateway

7. On a _______ channel each interface serves as both transmitter and receiver but only one interface can transmit at a time.





ANSWER= B) Half-duplex

8. _______ can be classified by frequency and wave length





ANSWER= A) Radio wave

9. ______ is host computer that requests for some services from a server





ANSWER= C) client

10. ______ is a computer on the network that facilitate the sharing of data, software and hardware resources





ANSWER= D) server

11. A work station that can be doubled up as a server and client is known as _______.





ANSWER= C) dedicated server

12. ______ may have a geographical area up to 1km





ANSWER= A) LAN

13. ______ is not a component of computer network





ANSWER= D) Volt meter

14. ______ is attached to a host so as to establish network connections.





ANSWER= A) Cable

15. The networks spread across countries or on a very big geographical area





ANSWER= B) WAN

16. ______ refers to all the legal and regulatory aspects of Internet and World Wide Web.





ANSWER= A) Cyber law

17. Server exclusively used for serving files related requests are called _____.





ANSWER= C) File server

18. Interconnection of autonomous computer is called _______ .





ANSWER= D) Network

19. ARPANET stands for ______.





ANSWER= D) Advanced Research Projects Agency Network

20. _______ is concerned with transmitting raw bits





ANSWER= D) Physical layer

21. _______ contains a variety of protocols.





ANSWER= D) Application layer

22. ______ layer concerned with syntax and semantics of the information.





ANSWER= A) Presentation

23. _______ Layer controls the operation of the subnet.





ANSWER= C) Network

24. ___________ Layer is to accept data from above layer and split it up into smaller units





ANSWER= A) Transport

25. IP stands for





ANSWER= A) Internet protocol

26. _________ is the standard protocol to transfer any types of files





ANSWER= A) FTP

27. SLIP stands for ________





ANSWER= A) Serial line internet protocol

28. PPP stands for





ANSWER= D) Point to point protocol

29._______ is a client / server software program





ANSWER= C) Interspace

30. LAN stands for





ANSWER= A) Local area network

31. The networks spread across the countries are known as





ANSWER= C) WANs

32. Appearance or layout of a network is called





ANSWER= A) topology

33. _________ topology consists of a single length of transmission medium into which the various nodes are attached.





ANSWER= D) Bus

34. ______ topology is the combination of bus and star topology.





ANSWER= C) Tree

35. _____ is a layered set of protocol





ANSWER= A) IP

36. The _________ layer allows users on different machines to establish sessions between them.





ANSWER= D) Session

37. MIME stands for





ANSWER= C) Multipurpose internet mail extensions

38. UTP stands for





ANSWER= C) Unshielded twisted pair cable

39. DGM stands for





ANSWER= A) Data grade medium

40. _______ is used to segment networks into different sub networks





ANSWER= B) Switch

41. A ______ is a device that lets you link two similar type networks together





ANSWER= B) Bridge

42. In ________ topology, nodes are connected together in an arbitrary fashion.





ANSWER= C) Graph topology

43. A _______ is a device that can handle different protocols





ANSWER= B) Router

44. A ______ is a hardware device used to connect several computers together.





ANSWER= D) Hub

45. _______ is a device that amplifies a signal being transmitted on the network





ANSWER= A) Repeater

46. SMS stands for





ANSWER= B) Short message service

47. SIM typically have memory from





ANSWER= D) 16 to 64kb

48. SIM stands for





ANSWER= B) Subscriber identity module

49. Wimax can provide broadband wireless access upto 30 miles for __________.





ANSWER= A) Fixed station

50. _______ are messages that a web server transmits to a web browser so that a web server can keep track of the user’s activity on a specific web site.





ANSWER= C) Cookies

51. The ________ are malicious programmers who break into secure systems.





ANSWER= A) Crackers

52._____ is a malicious program that requires a host and is designed to make a system sick





ANSWER= B) Computer virus

53. Wi – Fi refers to





ANSWER= B) Wireless fidelity

54. Radio wave can be classified by frequency and _______.





ANSWER= C) Wavelength

55. The ________ transmission used direct line – of – slight





ANSWER= D) Laser

56. A _________ is a device that connects dissimilar networks.





ANSWER= B) Gateway

57. __________ is meant to server subscribers at homes or offices.





ANSWER= A) WLL

58. A ___________ is a live, visual connection between two or more people residing in separate locations for the purpose of communication.





ANSWER= D) VC

59. A ________ is a venue that offers wi – fi access.





ANSWER= A) Hot spot

60. The GSM standard for digital cell phones was established in Europe in the mid __________.





ANSWER= C) 1980

61. The __________ technology is providing up to 25 Mbps connectivity speed.





ANSWER= D) 5G

62. _____ form the most secure level of authorization.





ANSWER= A) Bio metric system

63. In India the cyber laws are contained in the information technology act, 2000 which was notified on ________ October 2000.





ANSWER= B) 17

64. ______ virus use protocols and commands of computer network to spread themselves on the network.





ANSWER= C) Network Virus

65. __________ is more commonly known today is a computing platform widely used by IT service companies.





ANSWER= A) Cloud Technology

66. _________ form of coaxial cable is thinner and it can have maximum segment length of 185 meters.





ANSWER= D) Thin net

67. __________ is the basis for most internal office telephone wiring.





ANSWER= A) VGM

68. A variation of bus topology is the _________ topology.





ANSWER= B) Tree

69. Dedicated server is known as __________ server.





ANSWER= C) File

70. _______ was the first protocol for relaying the IP packets over dial – up lines.





ANSWER= B) SLIP

71. A ___________ is a physical thing, appearing on an Ethernet or some wire.





ANSWER= D) Packet

72. A __________ is a unit of data, which is what the protocols deal with





ANSWER= B) Data gram

73. ________ is the base communication protocol of the internet.





ANSWER= A) TCP

74. ______ sharing provides sharing and grouping of data files over the network.





ANSWER= C) Email

75. The ________ layer is used to transform a raw transmission facility into a line that appears free of undetected transmission errors to the network layer.





ANSWER= B) Physical

2nd puc computer science chapter 15 mcq 2nd puc computer science chapter 15 mcq Reviewed by Vision Academy on March 24, 2023 Rating: 5

No comments:

CheckOut

Powered by Blogger.