WELCOME To Our Channel
INSIGHT CS - IT
1. A network that links many different
type of computers all over the world.
a) Intranet
b) Internet
c) Extranet
d) LAN
2. Example of computer full duplex mode is
a) Telephone
b) Internet broadcasting
c) Both A and B
d) Television
3. Which of the through is share the data
of two computer?
a) Library
b) Network
c) Grouping
d) Integrated system
4. Computer data transmission mode in
which data can flow in both directions
but not at the same time is called
a) simplex mode
b) half duplex mode
c) full duplex mode
d) duplex mode
5. Way in which computer data is transmitted
from one place to another is called
a) Transmission mode
b) Transfer mode
c) Sending mode
d) Receiving mode
6. Which of the following best describes
uploading information?
a) Sorting data on a disk drive
b) Sending information to a host computer
c) Receiving information from a host computer
d) Sorting data on a hard drive
7. System in a computer which translates
an IP address into an easier name is called
a) Packet-switching domain system
b) Domain name system
c) Domain
d) Domain numbering system
8. All of the following are top-level
computer domains except
a) .edu
b) .org
c) .gov
d) .army
9. The combination of two or more
interconnected networks is called
a) Internetwork
b) LAN
c) MAN
d) WAN
10. Which of the following
transmission directions listed is not a
legitimate channel?
a) Simplex
b) Half Duplex
c) Full Duplex
d) Double Duplex
11. Which type of topology is best suited
for large businesses which must carefully
control and coordinate the operation of
distributed branch outlets?
a) Ring
b) Local area
c) Hierarchical
d) Star
12. What covers a larger geographical
area than MAN?
a) WAN
b) LAN
c) Both A and B
d) None of the above
13. “Parity bits” are used for which of
the following purposes?
a) Encryption of data
b) To transmit faster
c) To detect errors
d) To identify the user
14. A collection of hyperlinked
documents on the internet forms the ?.
a) World Wide Web (WWW)
b) E-mail system
c) Mailing list
d) Hypertext markup language
15. The location of a resource on the
internet is given by its?
a) Protocol
b) URL
c) E-mail address
d) ICQ
16. The term HTTP stands for?
a) Hyper terminal tracing program
b) Hypertext tracing protocol
c) Hypertext transfer protocol
d) Hypertext transfer program
17. A proxy server is used as the
computer?
a) With external access
b) Acting as a backup
c) Performing file handling
d) Accessing user permissions
18. Which software prevents the
external access to a system?
a) Firewall
b) Gateway
c) Router
d) Virus checker
19. Which one of the following is a valid
email address?
a) javat@point.com
b) gmail.com
c) tpoint@.com
d) javatpoint@books
20. Which one of the following is the most
common internet protocol?
a) HTML
b) NetBEUI
c) TCP/IP
d) IPX/SPX
21. Which one of the following is not a
network topology?
a) Star
b) Ring
c) Bus
d) Peer to Peer
22. The maximum length (in bytes) of
an IPv4 datagram is?
a) 32
b) 1024
c) 65535
d) 512
23. The length of an IPv6 address is?
a) 32 bits
b) 64 bits
c) 128 bits
d) 256 bits
24. The length of an IPv4 address is?
a) 32 bits
b) 64 bits
c) 128 bits
d) 256 bits
25. The term IANA stands for?
a) Internet Assigned Numbers Authority
b) Internal Assigned Numbers Authority
c) Internet Associative Numbers Authoritative
d) Internal Associative Numbers Authority
THANK YOU
WELCOME To Our Channel
INSIGHT CS - IT
26. The first Network
a) ARPANET
b) CNNET
c) NSFNET
d) ASAPNET
e) None of these
27. How many versions available of IP?
a) 6 version
b) 4 version
c) 2 version
d) 1 version
28. The term IPv4 stands for?
a) Internet Protocol Version 4
b) Internet Programming Version 4
c) International Programming Version
d) None of these
29. Which of the following methods is
used to broadcast two packets on the
medium at a time?
a) Collision
b) Synchronous
c) Asynchronous
d) None of the above
30. The private key in asymmetric key
cryptography is kept by?
a) Sender
b) Receiver
c) Sender and Receiver
d) None of the these
31. Mesh topology, have devices
which are connected via
a) single and multiple links
b) Multipoint link
c) Point to point link
d) No Link
32. LAN has mostly used the topologies
a) Bus
b) Ring
c) Star
d) All of these
33. Which topologies have two or more
Combination
a) multigrid
b) Star Topology
c) Bus Topology
d) Ring topology
e) Hybrid
34. Which topology has the highest reliability?
A) Mesh topology
b) Star topology
c) Ring Topology
d) Bus Topology
e) none of these
35. Star Topology is basically based
on a central device ______
a) HUB
b) Switch
c) Gates
d) Both a and b
e) none of these
36. A topology that is responsible for
describing the geometric arrangement of
components that make up the LAN
a) Complex
b) Physical
c) Logical
d) Incremental
37. In a network, participating computers
are referred to as
a) Clients
b) Servers
c) Nodes
d) CPUs
e) both a and c
38. Tokens are involved in a topology.
a) Star
b) hybrid
c) Bus
d) Daisy Chaining
e) Ring
39. The performance of a data communications
network is highly dependeds on _____
a) Number of users
b) transmission
c) hardware and software
d) All of the above
40. Which type of protocol provides a
virtual terminal in TCP/IP model_____
a) SMTP
b) Telnet
c) HTTP
d) None of these
41. Which of the following protocols are
used for Email ?
a) TELNET and SMTP
b) SMTP and POP
c) POP and FTP
d) TELNET and FTP
42. Mobile Application Protocol typically
runs on top of which protocol______?
a) SMTP
b) SNMP
c) SS7
d) All of these
43. Computer and a keyboard involves_____
transmission to communicate
a) Automatic
b) Simplex
c) Half-duplex
d) Full-duplex
e) None of these
44. _____ physical path is used to travel
massages form one place to another
a) Path
b) Protocol
c) Route
d) Medium
e) None of these
45. Which of this is not a network edge device?
a) Switch
b) PC
c) Smartphones
d) Servers
e) None of these
THANK YOU
WELCOME To Our Channel
INSIGHT CS - IT
TOPIC :- E - MAIL
Who invented email?
a) Larry Page
b) Tim Barners
c) Ray Tomlinson
d) All of these
The user name and email server parts of
an email address are separated by
_______ symbol
a) #
b) @
c) &
c) $
An email may contain non-text
information which may be __________
a) downloaded
b) uploaded
c) erased
d) transmitted
The second part of email address
identifies ______
a) name of bank
b) name of the email server
c) name of individual user
d) name of the mobile phone operator
You can _________ an email if you want to
remember it is important, and this also puts the
email into a special folder for easy access
a) Star
b) Draft
c) Label
d) Reply
What sends a copy of an email to a new
recipient?
a) Reply
b) BCC
c) Reply All
d) Forward
The first part of email address
identifies____
a) name of the email server
b) name of the mobile phone operator
c) name of individual user
d) name of bank
Gmail.com, yahoo.com, yahoo.co.in,
ymail.com, rediff.com, rediffmail.com,
fastmail.fm, etc. are popular_________________
a) email servers
b) social media sites
c) FTP servers
d) None
SMTP stands for__________________
a) Simple Mail Transfer Protocol
b) Server Mail Transfer Protocol
c) Short mail transmission protocol
d) Small mail transmission protocol
What is the main folder in Gmail?
a) Inbox
b) Trash
c) SPAM
d) Star
What do we call the people we send an
email to?
a) Recipients
b) SPAM
c) Contacts
d) Inbox
In MS Office, ______ is the software for
managing emails
a) MS Publisher
b) MS Access
c) MS Outlook
d) None
In email communication, CC stands for
a) cold coffee
b) carbon copy
c) casual copy
d) blind carbon copy
The email ID of a person contains _______
parts
a) 4
b) 3
c) 2
d) 5
The file attached to an email is called
the _______
a) attachment
b) content
c) subject
d) BCC
The email ID of the secondary recipient
of email is entered in ______ field
a) CC
b) BCC
c) Subject
d) To
Unsolicited emails may be filtered and
separated into ____
a) inbox
b) spam bin
c) sent mails
d) draft
How do you properly format an email?
a) Subject, Body, Signature, Closing
b) Subject, Salutation, Body, Signature
c) Signature, Body, Salutation, Subject
d) Subject, Salutation, Body, Closing,
Signature
What does BCC stand for when sending
an email?
a) Blind Copy Carbon
b) Blind Copy of a Copy
c) Blind Carbon Copy
D Bulk Copy of a Copy
A half completed email may be saved for
later editing and transmission to the
receiver in ______ folder.
a) inbox
b) spam bin
c) sent mails
d) draft
What is the term used to describe what
Internet scammers do to trick people our
of their personal information?
a) Catfishing
b) Phishing
c) Hacking
d) Digital Theft
Which of these is correct email address?
a) userName@website@com
b) userName.website.com
C) userName.website@com
d) userName@website.com
Which of the following statements is incorrect
with respect to writing e-mails?
a) We cannot add more than one address in the
"To" field.
b) We can leave the 'Bcc' field blank
c) We can leave the "Cc field blank.
d) The To' and 'Cc fields are often used
interchangeably.
What is the use of Carbon copy (CC)?
a) Recipients are invisible to all of the other
recipients of the message in CC
b) Recipients are visible to all of the other
recipients of the message in CC
c) Recipients are invisible to only one recipients
of the message in CC
d) None of the above
Which of the following is mandatory for
sending an email?
a) Body
b) Sender mail ID
c) Attachment
d) Subject
What is included in an E-mail address?
a) Domain name followed by user's name
b) User's name followed by domain name
c) User's name followed by postal address
d) User's name followed by Street address
A block of text automatically added to
the end of an outgoing email is called
an/a
a) Attachment
b) Signature
c) Decryption
d) Encryption
THANK YOU
WELCOME To Our Channel
INSIGHT CS - IT
TOPIC
OSI Or TCP / IP MODEL
OSI Model TCP / IP Model
▪ It stands for Open System Interconnection. ▪ It stands for Transmission Control Protocol.
▪ It consists of 7 layers. ▪ It consists of 4 layers.
▪ OSI model has been developed by ISO ▪ It was developed by ARPANET (Advanced
(International Standard Organization) Research Project Agency Network).
▪ In this model, the session and ▪ In this model, the session and presentation
presentation layers are separated, i.e., layer are not different layers. Both layers are
both the layers are different.. included in the application layer.
Layer 1: The Physical Layer
Data encoding, Transmission technique, Physical medium
transmission:
Layer 2: The data-link layer
Frame Traffic Control, Frame Sequencing, Frame
Acknowledgment, Frame Delimiting: Link Establishment and
Termination: Frame Error Checking , Media access
management
Layer 3: The Network Layer
Connection setup • Addressing • Routing • Security •
Quality of Service • Fragmentation
Layer 4: The Transport Layer
Resource Utilization (multiplexing)
Connection Management (establishing & terminating)
Flow Control (Buffering / Windowing)
Layer 5: The Session Layer
Simplex:, Half Duplex, Full Duplex
Layer 6: The Presentation Layer
Data representation
Data security
Data compression:
Layer 7: The Application Layer
Resource sharing and device redirection • Remote
file access • Remote printer access • Network
management • Directory services • Electronic
messaging (such as mail) etc
OSI stands for
a) open system interconnection
b) operating system interface
c) optical service implementation
d) none of the mentioned
The number of layers in ISO OSI
reference model is __________
a) 4
b) 5
c) 6
d) 7
The_________ layer lies between the
session layer and the application layer.
a. network layer
b. transport layer
c. data link layer
d. presentation layer
Segmentation and reassembly is the
responsibility of
a. 7th Layer
b. 6th Layer
c. 5th Layer
d. 4th layer
Decryption and encryption are the
features of
a. transport layer
b. Application layer
c. presentation layer
d. session layer
The layer is responsible for process
delivery
a. network layer
b. transport layer
c. session layer
d. data link layer
Which address identifies a process on
a host?
a. physical address
b. logical address
c. port address
d. specific address
The_________ layer uses data compression
to reduce the number of bits to be
transmitted.
a. presentation
b. network
c. data link
d. application
TCP/IP model does not have ______ layer
but OSI model have this layer.
a) session layer
b) transport layer
c) application layer
d) network layer
Which layer is used to link the network
support layers and user support layers?
a) session layer
b) data link layer
c) transport layer
d) network layer
THANK YOU
WELCOME To Our Channel
INSIGHT CS - IT
TOPIC
OSI Or TCP / IP MODEL
TCP/IP model was developed _____ the
OSI model.
a) prior to
b) after
c) simultaneous to
d) with no link to
Which layer is responsible for process
to process delivery in a general network
model?
a) network layer
b) transport layer
c) session layer
d) data link layer
The physical layer is concerned with
a) bit-by-bit delivery
b) process to process delivery
c) application to application delivery
d) port to port delivery
Which transmission media provides the
highest transmission speed in a
network?
a) coaxial cable
b) twisted pair cable
c) optical fiber
d) electrical cable
The physical layer is responsible for
a) line coding
b) channel coding
c) modulation
d) all of the mentioned
The physical layer translates logical
communication requests from the ______
into hardware specific operations.
a) data link layer
b) network layer
c) trasnport layer
d) application layer
Which is not a application layer protocol?
a) HTTP
b) SMTP
c) FTP
d) TCP
The packet of information at the
application layer is called __________
a) Packet
b) Message
c) Segment
d) Frame
Application layer offers _______ service.
a) End to end
b) Process to process
c) Both End to end and Process to process
d) None of the mentioned
Electronic mail uses which Application
layer protocol?
a) SMTP
b) HTTP
c) FTP
d) SIP
The network layer is concerned with
__________ of data.
a) bits
b) frames
c) packets
d) bytes
Which one of the following is not a
function of network layer?
a) routing
b) inter-networking
c) congestion control
d) error control
A 4 byte IP address consists of _______
a) only network address
b) only host address
c) network address & host address
d) network address & MAC address
Which of the following routing algorithms
can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
The data link layer takes the packets
from _________ and encapsulates them
into frames for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
A message travels over a physical
path is called___.
a) Signals
b) Medium
c) Protocols
d) All the above
Which address identifies a process on a
host?
a. physical address
b. logical address
c. port address
d. specific address
The physical layer is responsible for
movements of individual
a) Frames
b) Bit
c) Packet
d) Bytes
A device that operates below the physical
layer of the OSI model is
a) active hub
b) repeater
c) bridge
d) passive hub
IEEE 802.11 covers the physical layer and
a) Datalink layer
b) Network layer
c) Session layer
d) Transport layer
Wireless transmission can be done via
a) microwaves
b) radio waves
c) infrared
d) all of the mentioned
THANK YOU