Quiz STET 2023 Shift 1 Quiz 2023 STET exam S1 Questions Quiz 1 / 100 What is the simplified expression for the Boolean function F(A, B, C, D) = Σ(0, 1, 2, 4, 5, 6, 8, 9, 10, 12, 13, 14) using the K-map method? A'B'C'D' + A'B'C'D + A'BC'D + AB'C'D + ABCD A'B'C'D' + A'BC'D + AB'C'D + ABC'D + ABCD A'B'C'D' + A'BC'D + ABC'D + ABCD A'B'C'D' + A'BC'D' + A'BCD + ABCD 2 / 100 In a PLA, what components are used to implement the combinational logic functions? AND gates and OR gates NAND gates and XOR gates NOR gates and XNOR gates NOT gates and multiplexers 3 / 100 Which type of register is primarily used to temporarily hold data during arithmetic and logical operations in a microprocessor? Shift register Parallel register Accumulator register Counter register 4 / 100 Which logic family uses both depletion and enhancement mode MOSFETs for its operation? TTL ECL PMOS CMOS 5 / 100 What is the primary difference between ROM and RAM?ROM is faster than RAM ROM is faster than RAM ROM is volatile, while RAM is non-volatile ROM is used for data storage, while RAM is used for program execution ROM stores permanent data that cannot be changed, while RAM stores temporary data that can be read and written 6 / 100 Given a Boolean function F(A, B, C) = Σ(0, 1, 2, 3, 5), what is the expression in SOP form? A'B' + AB' + AB + AC A + B + C AB' + C' A'B'C' 7 / 100 If the sum of two positive binary numbers is 11010 and there is a carry-out from the MSB, what should be done to obtain the correct result? Discard the carry Add the carry to the least significant bit (LSB) Add the carry to the most significant bit (MSB) Subtract the carry from the MSB 8 / 100 In binary multiplication using the simple method, what is the first step after aligning the digits and preparing for multiplication? Multiply the least significant bit (LSB) by the multiplier Multiply the most significant bit (MSB) by the multiplier Multiply the least significant bit (LSB) by the multiplicand Multiply the most significant bit (MSB) by the multiplicand 9 / 100 What is the relationship between the distance between parity bits and their error detection and correction capability in Hamming Code? Closer parity bits provide higher error correction capability Closer parity bits provide lower error correction capability Distance between parity bits has no impact on error correction capability The position of parity bits is irrelevant in Hamming Code 10 / 100 To convert a Gray Code to its binary equivalent, which technique is commonly used? Subtraction method Addition method Exclusive OR (XOR) operation Division method 11 / 100 Which component of an ideal microcomputer is responsible for temporarily holding data and instructions during processing? CPU ALU Memory Output devices 12 / 100 How is the width of the data bus typically measured in a microcomputer system? In kilobytes (KB) In megahertz (MHz) In bits In address lines 13 / 100 Microcontrollers find application in various fields. What is a typical application of microcontrollers in the automotive industry? Operating systems for computers Entertainment systems in airplanes Engine control in cars Weather forecasting systems 14 / 100 Which data structure often results in a time-space tradeoff by using extra memory to speed up operations? Arrays Linked lists Hash tables Stacks 15 / 100 Which term refers to the strategy of optimizing an algorithm's use of resources, often by making sacrifices in one aspect for improvements in another? Greedy algorithm Divide and conquer Dynamic programming Tradeoff 16 / 100 Conditional asymptotic notation allows for a more nuanced analysis of algorithm behavior under specific conditions. This is particularly useful when: Analyzing algorithms with constant time complexity The input size is fixed The input data is random Algorithm behavior varies based on certain input characteristics 17 / 100 If an algorithm's behavior is bounded by "o(f(n)) if g(n)", what notation does it become when the condition is removed? o(f(n)) o(g(n)) o(f(n) + g(n)) o(f(n) * g(n)) 18 / 100 The recurrence equation T(n) = T(n/2) + 1 represents the time complexity of which algorithmic paradigm? Divide and Conquer Greedy Algorithms Dynamic Programming Brute Force 19 / 100 Divide and Conquer is an algorithmic paradigm that solves problems by: Iteratively solving subproblems Recursively solving subproblems Using heuristics to find solutions Greedily combining solutions 20 / 100 A threaded binary tree is a binary tree in which: Each node has two children Each node has at most one child Each node is connected to its parent Each node has a thread connecting it to its predecessor or successor 21 / 100 Which traversal algorithm is typically implemented using a stack data structure? DFS BFS Both DFS and BFS Neither DFS nor BFS 22 / 100 In a directed graph, an edge that points from vertex A to vertex B is denoted as: (A, B) [A, B] <A> {A, B} 23 / 100 Separate chaining involves storing collided elements in separate data structures, typically in: Linked lists Arrays Stacks Queues 24 / 100 Which collision resolution technique involves placing collided elements in the next available empty slot in the hash table? Linear probing Quadratic probing Separate chaining Double hashing 25 / 100 In the Tower of Hanoi problem with "n" disks, how many moves are required to solve the problem? n 2n 2^n - 1 2^n 26 / 100 The process of removing recursion involves replacing recursive function calls with: More recursive function calls Loops Additional memory allocation Non-recursive function calls 27 / 100 A formal model of protection in an operating system provides: A mathematical framework for analyzing resource allocation Guidelines for designing user interfaces Methods for optimizing memory management Techniques for improving CPU utilization 28 / 100 In an operating system, a "buffer cache" is used to: Store files in memory Store copies of frequently used files in memory Store the operating system kernel Store input/output devices 29 / 100 File manipulation operations in an operating system include: Allocating memory to files Assigning file names to processes Loading files into CPU registers Reading, writing, and modifying file content 30 / 100 The I/O subsystem in an operating system is responsible for: Allocating memory for processes Managing the file system Managing input/output operations between processes and input/output devices Allocating CPU time to processes 31 / 100 The primary goal of load control is to: Prevent processes from running concurrently Avoid context switching between processes Ensure that CPU time is evenly distributed among processes Maximize the usage of virtual memory 32 / 100 The purpose of a page table in a paging system is to: Store pages of memory Manage input/output operations Translate virtual addresses to physical addresses Store program instructions 33 / 100 In multiprogramming with fixed partitions, if a process requires more memory than is available in a partition, it may lead to: Fragmentation Deadlock Priority inversion Starvation 34 / 100 What is DBMS? DBMS is a collection of queries DBMS is a high-level language DBMS is a programming language DBMS stores, modifies and retrieves dataDBMS stores, modifies and retrieves data 35 / 100 Which of the following is correct according to the technology deployed by DBMS? Pointers are used to maintain transactional integrity and consistency Cursors are used to maintain transactional integrity and consistency Locks are used to maintain transactional integrity and consistency Triggers are used to maintain transactional integrity and consistency 36 / 100 The term "NTFS" refers to which one of the following? New Technology File System New Tree File System New Table type File System Both A and C 37 / 100 Which of the following is a top-down approach in which the entity's higher level can be divided into two lower sub-entities? Aggregation Generalization Specialization All of the above 38 / 100 The term "DFD" stands for? Data file diagram Data flow document Data flow diagram None of the above 39 / 100 The term "FAT" is stands for File Allocation Tree File Allocation Table File Allocation Graph All of the above 40 / 100 The term "Data" refers to: The electronic representation of the information(or data) Basic information Row Facts and figures Both A and C 41 / 100 What is the primary function of routing in the network layer? Data framing Error correction Finding the best path for data Flow control 42 / 100 What is a socket in the context of process-to-process communication? A hardware device for data transmission A software interface for network communication A type of cable used for high-speed data transmission type of network topology 43 / 100 Data transmission using multiple pathways simultaneously is known as: Parallel Transmission Serial Transmission Duplex Transmission Half-duplex Transmission 44 / 100 Which of the following is NOT a network topology? Star Ring Disk Mesh 45 / 100 Contention-based MAC protocols are commonly used in: Ethernet networks Token Ring networks ATM networks Point-to-Point networks 46 / 100 Routing involves: Dividing data into frames Managing flow control Determining the best path for data packets Correcting errors in data transmission 47 / 100 What is the purpose of ARP (Address Resolution Protocol)? To assign IP addresses to devices To resolve domain names to IP addresses To map MAC addresses to IP addresses To manage network congestion 48 / 100 Which software life cycle model allows for iterative development and incorporates risk analysis? Waterfall model Prototype model Spiral model Agile model 49 / 100 What is the main goal of software quality assurance ? To eliminate all defects from the software To ensure the software is defect-free before release To establish and enforce standards and processes to improve software quality To test software under different conditions 50 / 100 Reverse engineering is primarily used for: Creating new software from scratch Improving software performance Understanding and documenting existing software Testing software components 51 / 100 Which testing approach involves testing individual components or units of code? Integration Testing System Testing Unit Testing Acceptance Testing 52 / 100 What is the main goal of System Testing? Testing individual components in isolation Testing the integration between different software components Testing software functionality from the user's perspective Identifying defects in the source code 53 / 100 Which metric is used for estimating the size of a software project? Cyclomatic Complexity Function Points (FP) Defect Density Software Reliability Index 54 / 100 What is the purpose of staffing level estimation in software project management? To determine the number of hardware components required To identify potential risks in the project To allocate appropriate resources to the project To estimate the maintenance costs of the software 55 / 100 Which keyword is used to create an instance of a class in most programming languages? alloc new create instance 56 / 100 What is an abstract class in OOP? A class with no methods A class that cannot be instantiated A class that can only have private members A class that cannot have methods with parameters 57 / 100 What is the purpose of the "super" keyword in Java and other similar languages? It refers to the superclass in inheritance It creates a new object instance It defines a new class It handles exceptions 58 / 100 Which of the following best defines a class? An instance of an object A blueprint for creating objects A variable holding data A function with a return value 59 / 100 Which principle ensures that only essential information is visible to the outside world? Polymorphism Information hiding Encapsulation Abstraction 60 / 100 What is the main purpose of inheritance in OOP? To create instances of classes To prevent data abstraction To establish a parent-child relationship between classes To define exceptions 61 / 100 What are abstract methods? Methods that are inaccessible to the outside world Methods that have implementation details Methods without a body, defined in an abstract class Methods that cannot be inherited 62 / 100 Which protocol is commonly used for sending emails? HTTPS FTP SMTP TCP 63 / 100 What does CSS stand for? Cascading Style System Creative Styling Script Computer Style Sheets Cascading Style Sheets 64 / 100 Which library simplifies JavaScript tasks like HTML document traversal and manipulation? JavaFX Bootstrap React jQuery 65 / 100 What does AJAX stand for? Asynchronous JavaScript and XML Automated JavaScript and XHTML Advanced JavaScript and XML Asynchronous JSON and XHTML 66 / 100 How does the DOM tree structure reflect the hierarchy of HTML elements? In alphabetical order Based on the element's size In a parent-child relationship According to the element's color 67 / 100 In XML, which attribute is used to uniquely identify an element? id class name tag 68 / 100 The Kleene Star operation accepts the following string of finite length over set A = {0,1} | where string s contains even number of 0 and 1. 01, 0011,010101 0011, 11001100 ε, 0011, 11001101 ε, 0011, 11001100 69 / 100 A Language for which DFA exist is a Regular Language Non-Regular Language Any language Cannot be said 70 / 100 Let u=’1101’, v=’0001’, then uv=11010001 and vu= 00011101.Using the given information what is the identity element for the string? u-1 v-1 u-1v-1 ε 71 / 100 For a DFA accepting binary numbers whose decimal equivalent is divisible by 3, what are all the possible remainders? 0 0,2 0,1,2 0,1,2,3 72 / 100 Minimum Number of states require to accept string ends with 101. 3 2 1 can’t be represented 73 / 100 If NFA of 5 states excluding the initial state is converted into DFA, maximum possible number of states for the DFA is? 64 32 128 187 74 / 100 The class of CFG is not closed under Concatenation Intersection Union Repeated Concatenation. 75 / 100 Which among the following is not true about IoT? IoT uses Micro Controllers IoT is fully safe IoT uses Sensors and Actuators IoT uses wireless technology 76 / 100 About IoT, which among the followings isnot correct? Light sensor is analog microphone is a digital sensor Keyboard is a digital sensor Push button is a digital Sensor 77 / 100 BLE stands for Bluetooth large energy Bluetooth low energy Bluetooth light energy Bluetooth long energy 78 / 100 WSN stands for? Wireless Standard Protocol Wireless Sensor Protocol Wireless Serial Protocol Wireless Single Protocol 79 / 100 A complex SCADA system has levels? 6 5 3 4 80 / 100 What is the role of the MISO pin in the RFID Module? Master In Slave Out Manage Internal Slave Output Master Internal Search Optimization Manage Input Slave Op 81 / 100 Who is known as the father of AI? Fisher Ada Alan Turing John McCarthy Allen Newell 82 / 100 Programming language commonly used for AI is ? Lisp Perl Prolog C++ 83 / 100 The algorithm used in the Game tree to make decisions of Win/Lose is ? Heuristic Search Algorithm DFS/ BFL algorithm Greedy Search algorithm Min/Max algorithm 84 / 100 Uniform-cost search expands the node n with the Lowest path cost Heuristic cost Highest path cost Average path cost 85 / 100 The process of removing detail from a given state representation is called Extraction Abstraction Data Mining Information Retrieval 86 / 100 What does a first order predicate logic contain? Predicate and a subject Predicate and a Preposition Subject and an object None of the above 87 / 100 Which of the following can improve the performance of AI agent? Precision Learning Observing All of the above 88 / 100 Which of the following is part of the four main types for e-commerce? B2B B2C C2B All of the above 89 / 100 What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left? B2B Marketplace Auction Reverse Auction Intranet 90 / 100 If it is easy for competitors to enter the market, the threat of new entrants is considered: Low High Moderate Negligible 91 / 100 Which of the following refers to creating products tailored to individual customers? Customization Adaptation Direct material Auction 92 / 100 Which form of e-marketplace brings together buyers and sellers from the same industry? Horizontal Vertical integrated isolated 93 / 100 Which of the following is done by Secure Sockets Layers? creates a secure, private connection to a web server Encrypts information Sends information over the internet All of the above 94 / 100 The delay that occur during the playback of a stream is called Stream delay Playback delay Jitter Event delay 95 / 100 In teardown state of real time streaming protocol is the server resources for client server delivers the stream to client server suspends delivery of stream server breaks down the connection 96 / 100 In Real Time Interactive Audio Video, Jitter is introduced in real-time data by delay between pixels layers frames packets 97 / 100 In Audio and Video Compression, voice is sampled at 8000 samples per second with 8 bits per sample 5 bits per sample 7 bits per sample 6 bits per sample 98 / 100 is basically a form of pictorial presentation. Photography Animations Drawing Creativity 99 / 100 Each represents a particular colour. Frame Character Pixel value None of the above 100 / 100 Audio compression can be used for voice and data video and voice speech or music picture and colors Your score isThe average score is 0% 0% Restart quiz /30 STET Network quiz helps us to increase our knowledge 1 / 30 Packets ofthe same session may be routed through different paths in: TCP but not UDP TCP and UDP UDP but not TCP 2 / 30 The Address Resolution Protocol (ARP) is used for : finding the IP address from the DNS f i n d i n g h t e MAC a d d r e s s h t a t c o r r e s p o n d s o t n a P I a d d r e s s finding the IP address that corresponds to a MAC address 3 / 30 . . . . . is primarily used for mapping host names and e- mail destinations to IP address but can also be used for other purposes. TCP(transfer control protocol) DNS(Domain Name System) SHA (Secure Hash Algorithms) 4 / 30 Repeater operates in which layer of OSI model? Application layer Presentation layet Physical layer 5 / 30 The store and forward mechanism is used in packet switching message switching Circuit switching Data gran switching 6 / 30 A network which is used for sharing data, software and hardware among several users owning microcomputers is called WAN MAN LAN VAN 7 / 30 Which of the following ISO level is more closely related to the physicalcommunications facilities? Application Session Network Data Link 8 / 30 In OSI model, when data is sent fromdevice A to device B, the 5th layer to receive data at B is Application layer Transport layer Link layer Session layer 9 / 30 You are in the process of analyzing a problem that requires you to collect and store TCP/IP Packets. Which of the following utilities isbest suited for this purpose? NBTSTAT NETSTAT Network Monitor Performance Monitor 10 / 30 Internetlike networks within enterprises. Intranets Switching alternating Extranets 11 / 30 Adistributed network configuration in which all data/ information pass through a central computer is Bus Network Star Network Ring Network Point to point network 12 / 30 What is the commonly used unit for measuring the speed o f data transmission? Bytes per second Baud Bits per second Either (b) or (c) 13 / 30 An example of an analog communication method is laser beam Microwave Voice grade telephone line All of the Above 14 / 30 Data security threats include Hardware failure Privacy invasion Fraudulent manipulation of data All of the above 15 / 30 Which of the following uses the greatest number of layers in the OSI model? Bridge Repeater Gateway Router 16 / 30 Which one ofthefollowing uses UDP as the transport HTTP Talnet DNS SMTP 17 / 30 Which IEEE Standards is used for Wi/Fi systems? 802.11 802.1 802.2 18 / 30 .... .....is the most important/powerful computer in atypical network. Desktop Network client Network server Network station 19 / 30 Geostationary satellites Aer placed at afixed point above het earth Rotate the earth about a fixed axis Rotate the earth about a varying axis All of the Above 20 / 30 . . is virus that inserts itself into a system's memory. Then it take number o f actions when an infected file is executed. Web-scripting virus Polymorphic virus Resident virus 21 / 30 Encryption/decryption provides a network with Privacy Authorities Integrity 22 / 30 .... ..is the continuous ability to send and receive data between interconnected networks. FTP SMTP Network Interoperability TNS 23 / 30 Multiplexing technique that shifts each signal to a different carrier frequency FDM TDM WDM Both A and B 24 / 30 What can happen at a Token Ring station? Examination ofthe destination address Regeneration of the frame Passingof the frame to the next station All of the Above 25 / 30 In networking terminology UTP means Unshielded Iwisted-Pair Ubiquitous Teflon Port Uniformly Terminating Port Unshield T port 26 / 30 In resources are allocated on demand. Packet switching Circuit switching Line switching Frequency switching 27 / 30 Communication between computers is almost always Serial Parallel Series Parallel Direct 28 / 30 During networking, the processor of the CPU asking each terminal whether it wants to send a message is called Querying Sharing Communicating Polling 29 / 30 Where does Bridge operate in OSI model? Physical layer Data link layer Application layer Both A and B 30 / 30 Routers operate in which layer of the OSI model? Physical layer Data link layer Network layer Your score is 0% Restart quiz Versant Mock Test This mock test is for practice versant test. 1 / 100 Staying /here how /long are you. staying here how long are you ? How long are you staying here? Are you staying how long? How long are you staying ? 2 / 100 Are they /where/ going? Where are going they ? Are they where going? Where are they going? Where are they go 3 / 100 You/ again / to see/ I didn’t /expect. I expect to see you again. I do expect to see you again. I didn’t expect to see you again. Again i didn’t expect to see you. 4 / 100 As / many/ orders/ he will/complete/ as he can. He will complete as many as order he can. He will complete as many order he can. He will complete many as order he can. He will completed as many as order he can. 5 / 100 David/for business/ travels frequently. Frequently David travels for business. For business david travels frequently. David travels for business frequently. David travels frequently for business. 6 / 100 A local hotel / 30% discount/has / agreed to offer. A local hotel agreed has to offer 30% discount. A local hotel has agreed to offer 30% discount. A local hotel has agreed 30% discount to offer. A local hotel has agreed to discount offer 30% . 7 / 100 What /had/ occurred/ in their absence/they discovered. They had discovered occurred what in their absence. They had discovered what occurred their in absence. They had discovered what occurred in their absence. They had discovered what in occurred their absence. 8 / 100 Has /fortunately/a nearby office/ become /vacant. Fortunately a office nearby has become vacant. Fortunately a nearby office has become vacant. Fortunately a nearby office has vacant become. Nearby office Fortunately has become vacant. 9 / 100 The_____ rises in the east. venus stars sun moon 10 / 100 The product is out of stock until the next_____ arrives. product stock consignment dispatch 11 / 100 Delhi is the_______ of India. Heart Dil Capital Devotion 12 / 100 The class______ to be close indefinitely because of the summer schedule. is has have had 13 / 100 The training program_____ a wide selection of courses to any interested employee at a minimum charge. did have had has 14 / 100 If you don’t_______ the height of requirement, you are not allowed to get on the ride. cover reach reached reaching 15 / 100 We had planned to go hiking today, but the weather was so bad that we had to come up with an_______ plan. different agreed another alternative 16 / 100 My friend, who lived in New York all his life, do me a personal_____ of the city. ride guide follow up tour 17 / 100 Where there is a______ there is a way. effort will desire hard work 18 / 100 Monkeys are one of the most athletic________ . kinds living beings animals species 19 / 100 She gets her supplier at a________ rate because she buys in bulk. low cost reasonable bargain minimum 20 / 100 Negotiations came to a halt as struggled to reach terms that were_______ to both parties. profitable agreed beneficial worthwhile 21 / 100 Some_______ were more concerned of their own business. person one people men 22 / 100 Singers have a_______ voice. melodious attractive pleasant soft 23 / 100 It looks like this document has been edited already – is this the final_____. document one editing look 24 / 100 I wanted to buy the book, but the bookstore didn’t have any in______. They expect to receive more next week. requisition store stock claim 25 / 100 The new trainees are______ along just fine. get getting reap attain 26 / 100 An increasing_______ of businesses have recently shut down due to the economic downturn. amount rate flow number 27 / 100 The company_____ its target last year and reported a profit. fix established estimated decided 28 / 100 For details about the_____, please consult the instruction manual. clothes shop amount product 29 / 100 I need to______ my hotel reservation. I won’t be staying there anymore. canceled cancel cancelling check out 30 / 100 I’m not sure I can come tomorrow. I’ll have to______ my schedule. look go through check manage 31 / 100 She was a junior manager but now she has been _______ to a senior management position. transferred promoted shifted reassigned 32 / 100 I’m a salesman. And you, what do you_______? work do doing make 33 / 100 I know you love traveling abroad. Would you be________ in a position in our overseas office? come in charge appoint transferred 34 / 100 A good police is always_________to customer request within 24 hours. Otherwise, they tend to become annoyed and may find other providers. accept response except work 35 / 100 Although sales were down last quarter, the owner had high_________that business would improve soon. demand desire claim expectations 36 / 100 Thank you very much for your help on such short______. It helped us immensely when time was running out. Time period Duration Notice 37 / 100 The employees of our factory must follow a strict set of safety________. Rules Measures protocols Methods 38 / 100 In my company it is the manager’s job to divide work______the team members. amongst between with among 39 / 100 Before you drive over the bridge you have to_______the money at the booth. give of advanced give pay 40 / 100 You may not be______with these methods, but there’s no question that he makes a lot of money for the company. satisfied agreed happy pleased 41 / 100 The bill wasn’t right. I think they______a mistake. Did Done Make Made 42 / 100 Can I bring you something to_______? Perhaps tea or coffee? You Sip Consume Drink 43 / 100 I haven’t eaten anything all day. I’m so_________! Low starving hungry Not well 44 / 100 You’re driving too______. You should slow down. brisk speed fast rapid 45 / 100 I haven’t eaten anything all day. I’m so________! angry hungry upset empty 46 / 100 Finally, everything I had to do is finished now that the project has reached its__________. time limit complition objective end 47 / 100 The department is responsible for the mistake so they will have to_____the cost of the failure themselves. maintain carry take pay 48 / 100 The training programme_____a wide selection of courses to any interested employee at a minimum charge. along for to with 49 / 100 It's_______to be seen whether the company will stay in business next year. Pleasure Good Nice Sad 50 / 100 I had to take out a _______from the bank to cover the cost of replacing the roof of my house. Money Gold Loan Saving 51 / 100 Thank you very much for your help on such short________. It helped us immensely when time was running out. Time period Notice Remark 52 / 100 My ______are ringing because the music was so loud at the concert. Heart Brain Ears Head 53 / 100 This is cutting _______technology – it’s the best in the market. Hightec New Advanced Edge 54 / 100 I don’t _______what I wrote. I’m going to rewrite it completely. Reminisce Remember Recorgnise Recall 55 / 100 I was recently_______from the Berlin office to the Tokyo office. Move back Back Returned Transferred 56 / 100 The elevator is broken, so you will have to take the _______to get to the second floor. Escalator Stairs Winch Crane 57 / 100 The amount of air pollution in this town has increased substantially _______the factory opened. Due to From Since Because 58 / 100 When it rains, there are ______clouds in the sky. Rainstorm Dark Stars Thunderstorms 59 / 100 Let’s _______tomorrow’s presentation until next week. I’m just too busy to prepare for it right now. Hold off Neglet Push back postponed 60 / 100 My flight departed ten minutes later than scheduled but arrived on ______at the destination. Time right time Incorrect time apparent 61 / 100 The man ______his car keys and spent an hour looking for them this morning. lost misplaced forget left 62 / 100 Can you turn the lights _____? I can’t see anything. Off In On Now 63 / 100 How many languages can you____? Talk speak hear listen 64 / 100 A web cookie is a small piece of data that is_______ sent from a website and stored in user's web browser while a user is browsing a website sent from a website and stored ni user's web browser while a user is browsing a website sent from root server to all servers sent from the root server to other root servers 65 / 100 What translates IP address into MAC address? Address Resolution protocol Organisationally unique identifier Network Interface Card Burned in Address 66 / 100 Hardware address is known as _______? MAC Address IP Address Network Interface Card Address Resolution protocol 67 / 100 _______adjusts the segment size to be smaller than MTU. Internet Protocol 6 User Datagram Protocol Internet Protocol 4 Transmission Conrtol Protocol 68 / 100 How many versions of IP's are there? 4 2 1 3 69 / 100 Version 6 of IP address has how many bits. 64 bits 128 bits 32 bit 256 bit 70 / 100 What is the format of IP address? 32 Bit 64 Bit 16 Bit 34 Bit 71 / 100 Encryption/decryption provides a network with Privacy Authorities Integrity 72 / 100 Internetlike networks within enterprises. Intranets Switching alternating Extranets 73 / 100 .... ..is the continuous ability to send and receive data between interconnected networks. FTP SMTP Network Interoperability TNS 74 / 100 Which IEEE Standards is used for Wi/Fi systems? 802.11 802.1 802.2 75 / 100 Routers operate in which layer of the OSI model? Physical layer Data link layer Network layer 76 / 100 Which of the following uses the greatest number of layers in the OSI model? Bridge Repeater Gateway Router 77 / 100 Where does Bridge operate in OSI model? Physical layer Data link layer Application layer Both A and B 78 / 100 Repeater operates in which layer of OSI model? Application layer Presentation layet Physical layer 79 / 100 . . is virus that inserts itself into a system's memory. Then it take number o f actions when an infected file is executed. Web-scripting virus Polymorphic virus Resident virus 80 / 100 . . . . . is primarily used for mapping host names and e- mail destinations to IP address but can also be used for other purposes. TCP(transfer control protocol) DNS(Domain Name System) SHA (Secure Hash Algorithms) 81 / 100 Data security threats include Hardware failure Privacy invasion Fraudulent manipulation of data All of the above 82 / 100 You are in the process of analyzing a problem that requires you to collect and store TCP/IP Packets. Which of the following utilities isbest suited for this purpose? NBTSTAT NETSTAT Network Monitor Performance Monitor 83 / 100 Geostationary satellites Aer placed at afixed point above het earth Rotate the earth about a fixed axis Rotate the earth about a varying axis All of the Above 84 / 100 In OSI model, when data is sent fromdevice A to device B, the 5th layer to receive data at B is Application layer Transport layer Link layer Session layer 85 / 100 Multiplexing technique that shifts each signal to a different carrier frequency FDM TDM WDM Both A and B 86 / 100 In resources are allocated on demand. Packet switching Circuit switching Line switching Frequency switching 87 / 100 .... .....is the most important/powerful computer in atypical network. Desktop Network client Network server Network station 88 / 100 During networking, the processor of the CPU asking each terminal whether it wants to send a message is called Querying Sharing Communicating Polling 89 / 100 An example of an analog communication method is laser beam Microwave Voice grade telephone line All of the Above 90 / 100 A network which is used for sharing data, software and hardware among several users owning microcomputers is called WAN MAN LAN VAN 91 / 100 Communication between computers is almost always Serial Parallel Series Parallel Direct 92 / 100 In networking terminology UTP means Unshielded Iwisted-Pair Ubiquitous Teflon Port Uniformly Terminating Port Unshield T port 93 / 100 What is the commonly used unit for measuring the speed o f data transmission? Bytes per second Baud Bits per second Either (b) or (c) 94 / 100 Adistributed network configuration in which all data/ information pass through a central computer is Bus Network Star Network Ring Network Point to point network 95 / 100 The store and forward mechanism is used in packet switching message switching Circuit switching Data gran switching 96 / 100 What can happen at a Token Ring station? Examination ofthe destination address Regeneration of the frame Passingof the frame to the next station All of the Above 97 / 100 Which of the following ISO level is more closely related to the physicalcommunications facilities? Application Session Network Data Link 98 / 100 The Address Resolution Protocol (ARP) is used for : finding the IP address from the DNS f i n d i n g h t e MAC a d d r e s s h t a t c o r r e s p o n d s o t n a P I a d d r e s s finding the IP address that corresponds to a MAC address 99 / 100 Packets ofthe same session may be routed through different paths in: TCP but not UDP TCP and UDP UDP but not TCP 100 / 100 Which one ofthefollowing uses UDP as the transport HTTP Talnet DNS SMTP Your score isThe average score is 66% 0% Restart quiz