Sei sulla pagina 1di 90

COMPUTER NETWORKI… IT OFFICER QUESTIONS

Computer Networking Questions – Set 1


By SenDhil Last updated Jan 9, 2017 

Buy Current Affairs PDF 2019 - Click Here


Buy Puzzles Questions PDF 2019 - New

Dear Aspirants,

Welcome to the Professional Knowledge Section in A airscloud.com. Here we are providing sample questions
in Computer Networking. It will be useful for the upcoming IBPS SO IT officer and SBI Assistant
Manager(System) examinations. We have also included some important questions that are repeatedly asked in
previous exams.

Download DBMS Q&A PDF for IT Officers 

1. Which of the following are the types of Internal Network Cards?


(A) Peripheral Component Interconnect (PCI), Wireless Network Card
(B) Industry Standard Architecture (ISA),Wireless Network Card
(C) Peripheral Component Interconnect (PCI), Industry Standard Architecture(ISA)
(D) None of the Above
 Answer

2. A networking device that forwards data packets along networks and acts as a central point of
network is called
(A) Repeater
(B) Router
(C) Bridge
(D) Hub
 Answer

3. Repeater operates in which layer of OSI model?


(A) Application layer
(B) Presentation layer
(C) Physical layer
(D) Transport layer
 Answer

4. Where does Bridge operate in OSI model?


(A) Physical layer
(B) Data link layer
(C) Both (1)and (2)
(D) Application layer
 Answer

5.  ____ uses a standard called IEEE 802.6.


(A) LAN
(B) WAN
(C) MAN
(D) PAN
 Answer

6. Which is the general network standard for the data link layer in the OSI Reference Model?
(A) IEEE 802.1
(B) IEEE 802.2
(C) IEEE 802.3
(D) IEEE 802.4
 Answer

7. Which of the following IEEE Standard is used for Wi-Fi systems?


(A) 802.11
(B) 802.1
(C) 802.2
(D) 802.10
 Answer

8. ____ refers to a family of IEEE standards dealing with local area network and metropolitan area
network.
(A) 802
(B) 800
(C) 801
(D) 803
 Answer

9. Routers operate in which layer of the OSI model?


(A) Physical layer
(B) Data link layer
(C) Network Layer
(D) All of these
 Answer

10. A communication network which is used by large organizations over regional, national or global area
is called ___
(A) LAN
(B) WAN
(C) MAN
(D) PAN
 Answer

AffairsCloud Recommends IBPSGuide Mock Test

IBPSGuide Yearly Platinum Package: 600+ Test Series

AffairsCloud Ebooks - Support us to Grow

Subscribe(Buy) Current Affairs PDF 2019 – Pocket, Study and Q&A (English & Hindi)
Subscribe(Buy) Puzzles & Seating Arrangement Questions PDF 2019 – New
Subscribe(Buy) Banking & Economy Awareness PDF 2019

 IT Officer Questions Networking Questions Professional Knowledge Questions

 Show Comments (18)

 Current Affairs 2019

 Current Affairs 2019

 Current Affairs 2019 PDF

 Current Affairs September 2019

 Current Affairs August 2019

 Current Affairs July 2019

 Current Affairs June 2019

 Current Affairs May 2019

 Current Affairs April 2019


COMPUTER NETWORKI… IT OFFICER QUESTIONS

Computer Networking Questions – Set 2


By SenDhil Last updated Jan 9, 2017 

Buy Current Affairs PDF 2019 - Click Here


Buy Puzzles Questions PDF 2019 - New

Dear Aspirants,

Welcome to the Professional Knowledge Section in A airscloud.com. Here we are providing sample questions
in Computer Networking. It will be useful for the upcoming IBPS SO IT officer and SBI Assistant
Manager(System) examinations. We have also included some important questions that are repeatedly asked in
previous exams.

Download DBMS Q&A PDF for IT Officers 

1. What is the default subnet mask for a class B network?


(A) 127.0.0.1
(B) 2550.0.0
(C) 255.255.0.0
(D) 255.255.255.0
 Answer

2. What is loopback address?


(A) 127.0.0.1
(B) 255.0.0.0
(C) 255.255.0.0
(D) 127.0.0.0
 Answer

3. A central computer surrounded by one or more satellite computers is called a


(A) Bus network
(B) Ring network
(C) Star network
(D) None of these
 Answer
4. A networking device that receives a signal on an electromagnetic or an optical transmission medium,
amplifies the signal,and then retransmits it along the medium is called
(A) Router
(B) Hub
(C) transmitter
(D) Repeater
 Answer

5. What is the default subnet mask for a class A network?


(A) 127.0.0.1
(B) 255.0.0.0
(C) 255.255.0.0
(D) 255.255.255.0
 Answer

6. UTP stands for


(A) Unshielded Twisted Pair
(B) Unshielded Twisted Port
(C) Uniformly Twisted Pair
(D) None
 Answer

7. Which of the following organization defines standards for modems?


(A) IEEE
(B) CCITT
(C) BELL
(D) None
 Answer

8. Which topology requires a hub?


(A) Ring
(B) Star
(C) Bus
(D) None
 Answer

9. Which OSI layer divides a file into segments that are an efficient size for routing?
(A) Transport Layer
(B) Network Layer
(C) Data link Layer
(D) None
 Answer

10. FDDI stands for


(A) Fiber Data Distribution Interface
(B) Fiber Distributed Data Interface
(C) Fixed Data Distribution Interface
(D) None
 Answer

AffairsCloud Recommends IBPSGuide Mock Test

IBPSGuide Yearly Platinum Package: 600+ Test Series

AffairsCloud Ebooks - Support us to Grow

Subscribe(Buy) Current Affairs PDF 2019 – Pocket, Study and Q&A (English & Hindi)
Subscribe(Buy) Puzzles & Seating Arrangement Questions PDF 2019 – New
Subscribe(Buy) Banking & Economy Awareness PDF 2019

 IT Officer Questions Networking Questions Professional Knowledge Questions

 Show Comments (31)

 Current Affairs 2019

 Current Affairs 2019

 Current Affairs 2019 PDF

 Current Affairs September 2019

 Current Affairs August 2019

 Current Affairs July 2019

 Current Affairs June 2019

 Current Affairs May 2019

 Current Affairs April 2019

 Current Affairs March 2019


COMPUTER NETWORKI… IT OFFICER QUESTIONS

Computer Networking Questions – Set 3


By SenDhil Last updated Jan 9, 2017 

Buy Current Affairs PDF 2019 - Click Here


Buy Puzzles Questions PDF 2019 - New

Dear Aspirants,

Welcome to the Professional Knowledge Section in A airscloud.com. Here we are providing sample questions
in Computer Networking. It will be useful for the upcoming IBPS SO IT officer and SBI Assistant
Manager(System) examinations. We have also included some important questions that are repeatedly asked in
previous exams.

Download DBMS Q&A PDF for IT Officers 

1. Which protocol working at the Transport layer provides a connectionless service between hosts?
(A) UDP
(B) ARP
(C) TCP/IP
(D) None
Answer

2. Which protocol does Ping use?


(A) UDP
(B) ICMP(Internet Control Message Protocol)
(C) TCP/IP
(D) None
Answer

3. UDP stands for


(A) User Datagram Protocol
(B) User Data Protocol
(C) Unlimited Datagram Protocol
(D) None
Answer
4. What protocol does PPP use to identify the Network Layer Protocol?
(A) UDP
(B) ICMP
(C) NCP(Network Control Protocol)
(D) None
Answer

5. With respect to a network interface card, the term 10/100 refers to


(A) protocol speed
(B) a ber speed
(C) megabits per seconds
(D) None
Answer

6. If you want to locate the hardware address of a local device, which protocol would you use
(A) UDP
(B) ARP(Adress Resolution Protocol)
(C) NCP
(D) None
Answer

7. …… is primarily used for mapping host names and email destinations to IP address
(A) TCP
(B) DNS(Domain Name System)
(C) NCP
(D) None
Answer

8. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one
machine to another?
(A) TCP
(B) SMTP)Simple Mail Transfer Protocol
(C) NCP
(D) None
Answer

9. _____ is the continuous ability to send and receive data between interconnected networks.
(A) FTP
(B) SMTP
(C) TNS
(D) Network Interoperability
 Answer

10. What is the default subnet mask for a class C network?


(A) 127.0.0.1
(B) 2550.0.0
(C) 255.255.0.0
(D) 255.255.255.0
 Answer

AffairsCloud Recommends IBPSGuide Mock Test

IBPSGuide Yearly Platinum Package: 600+ Test Series

AffairsCloud Ebooks - Support us to Grow

Subscribe(Buy) Current Affairs PDF 2019 – Pocket, Study and Q&A (English & Hindi)
Subscribe(Buy) Puzzles & Seating Arrangement Questions PDF 2019 – New
Subscribe(Buy) Banking & Economy Awareness PDF 2019

 IT Officer Questions Networking Questions Professional Knowledge Questions

 Show Comments (3)

 Current Affairs 2019

 Current Affairs 2019

 Current Affairs 2019 PDF

 Current Affairs September 2019

 Current Affairs August 2019

 Current Affairs July 2019

 Current Affairs June 2019

 Current Affairs May 2019

 Current Affairs April 2019

 Current Affairs March 2019


COMPUTER NETWORKI… IT OFFICER QUESTIONS

Computer Networking Questions – Set 4


By SenDhil Last updated Jan 9, 2017 

Buy Current Affairs PDF 2019 - Click Here


Buy Puzzles Questions PDF 2019 - New

Dear Aspirants,

Welcome to the Professional Knowledge Section in A airscloud.com. Here we are providing sample questions
in Computer Networking. It will be useful for the upcoming IBPS SO IT officer and SBI Assistant
Manager(System) examinations. We have also included some important questions that are repeatedly asked in
previous exams.

Download DBMS Q&A PDF for IT Officers 

1. Which layer is the closest to transmission medium?


(A) Transport layer
(B) Physical layer
(C) Network layer
(D) Datalink layer
 Answer

2. Which protocol is used to eliminate loops?


(A) TCP/IP
(B) Spanning Tree Protocol
(C) SMTP
(D) None
 Answer

3. What kind of scheme is the http protocol?


(A) get/put
(B) request/response
(C) store/forward
(D) queuing
 Answer
4. Which layer of OSI determines the interface of the system with the user?
(A) Session layer
(B) Application layer
(C) Network layer
(D) Datalink layer
Answer

5. Which of the following is an example of client-server model?


(A) FTP
(B) DNS
(C) TELNET
(D) All of the above
Answer

6. At which layer TCP/IP defines two protocols: Transmission Control Protocol(TCP) and User Datagram
Protocol(UDP)?
(A) Transport layer
(B) Application layer
(C) Network layer
(D) Datalink layer
Answer

7. which of the following uses the greatest number of layers in the OSI model?
(A) Bridge
(B) Repeater
(C) Router
(D) Gateway
Answer

8. Which Protocol use link state routing?


(A) OSPF(Open Shortest Path First)
(B) IGRP
(C) RIP
(D) None
Answer

9. Which PPP Protocol provides authentication,dynamic addressing and Multilink?


(A) LCP(Link Control Protocol)
(B) NCP
(C) RIP
(D) None
 Answer

10. Which of the following layer is the network support layer?


(A) Physical layer
(B) Data link layer
(C) Network layer
(D) All of the above
 Answer

AffairsCloud Recommends IBPSGuide Mock Test

IBPSGuide Yearly Platinum Package: 600+ Test Series

AffairsCloud Ebooks - Support us to Grow

Subscribe(Buy) Current Affairs PDF 2019 – Pocket, Study and Q&A (English & Hindi)
Subscribe(Buy) Puzzles & Seating Arrangement Questions PDF 2019 – New
Subscribe(Buy) Banking & Economy Awareness PDF 2019

 IT Officer Questions Networking Questions Professional Knowledge Questions

 Show Comments (181)

 Current Affairs 2019

 Current Affairs 2019

 Current Affairs 2019 PDF

 Current Affairs September 2019

 Current Affairs August 2019

 Current Affairs July 2019

 Current Affairs June 2019

 Current Affairs May 2019

 Current Affairs April 2019

 Current Affairs March 2019


COMPUTER NETWORKI… IT OFFICER QUESTIONS

Computer Networking Questions – Set 5


By SenDhil Last updated Jan 9, 2017 

Buy Current Affairs PDF 2019 - Click Here


Buy Puzzles Questions PDF 2019 - New

Dear Aspirants,

Welcome to the Professional Knowledge Section in A airscloud.com. Here we are providing sample questions
in Computer Networking. It will be useful for the upcoming IBPS SO IT officer and SBI Assistant
Manager(System) examinations. We have also included some important questions that are repeatedly asked in
previous exams.

Download DBMS Q&A PDF for IT Officers 

1. Switch is a device of……. Layer of OSI model?


(A) Physical
(B) Datalink
(C) Application
(D) Session
 Answer

2. Packets are found at which layer?


(A) Physical
(B) Datalink
(C) Application
(D) Network
 Answer

3. The IP address 135.0.10.27 belongs to address class?


(A) Class A
(B) Class B
(C) Class C
(D) None
 Answer
4. An http request contains how many parts?
(A) 1
(B) 2
(C) 3
(D) 4
Answer

5. A device which divides the incoming signal into low frequencies to send to voice devices, and high
frequencies for data to the computer.
(A) multicast router
(B) interface
(C) splitter
(D) None
Answer

6. Which of the following function is performed by TCP?


(A) Flow Control
(B) Error checking
(C) Subnetting
(D) All of the above
Answer

7. Which layer establishes, maintains & synchronizes the interaction between communicating devices?
(A) Physical
(B) Datalink
(C) Application
(D) Session
Answer

8. Which of the following is a timer used for collision avoidance?


(A) NAV(Network Allocation Vector)
(B) DCF
(C) PCF
(D) None
Answer

9. The access method used in DCF MAC sub-layer is


(A) CSMA/CD
(B) CSMA/CA
(C) Polling
(D) None
 Answer

10. The access method used in PCF MAC sub-layer is


(A) CSMA/CD
(B) CSMA/CA
(C) Polling
(D) None
 Answer

AffairsCloud Recommends IBPSGuide Mock Test

IBPSGuide Yearly Platinum Package: 600+ Test Series

AffairsCloud Ebooks - Support us to Grow

Subscribe(Buy) Current Affairs PDF 2019 – Pocket, Study and Q&A (English & Hindi)
Subscribe(Buy) Puzzles & Seating Arrangement Questions PDF 2019 – New
Subscribe(Buy) Banking & Economy Awareness PDF 2019

 IT Officer Questions Networking Questions Professional Knowledge Questions

 Show Comments (4)

 Current Affairs 2019

 Current Affairs 2019

 Current Affairs 2019 PDF

 Current Affairs September 2019

 Current Affairs August 2019

 Current Affairs July 2019

 Current Affairs June 2019

 Current Affairs May 2019

 Current Affairs April 2019

 Current Affairs March 2019


COMPUTER NETWORKI… IT OFFICER QUESTIONS

Computer Networking Questions – Set 6


By SenDhil Last updated Jan 9, 2017 

Buy Current Affairs PDF 2019 - Click Here


Buy Puzzles Questions PDF 2019 - New

Dear Aspirants,

Welcome to the Professional Knowledge Section in A airscloud.com. Here we are providing sample questions
in Computer Networking. It will be useful for the upcoming IBPS SO IT officer and SBI Assistant
Manager(System) examinations. We have also included some important questions that are repeatedly asked in
previous exams.

Download DBMS Q&A PDF for IT Officers 

1. Peer-to-Peer (P2P) is a ……..communications model


(A)Centralized
(B)decentralized
(C)client/server
(D)None
 Answer

2. Ethernet, token ring and token bus are types of………


(A) MAN
(B) WAN
(C) LAN
(D) None
 Answer

3. What is the name of network topology in which there are bidirectional links between each possible
node?
(A) Star
(B) Mesh
(C) Ring
(D) None
 Answer

4. Fiber Distributed Data Interface (FDDI) is an example of which topology?


(A) Star
(B) Mesh
(C) Ring
(D) None
 Answer

5. Which TCP/IP protocol is used for file transfer with minimal capability and minimal overhead?
(A) SGMP
(B) TFTP
(C) SUMP
(D) None
 Answer

6. An IPV6 address is…… bits long


(A) 64
(B) 128
(C) 256
(D) 512
 Answer

7. Addresses in Class D are used for…..


(A) Unicast Communication
(B) Multicast Communication
(C) Both (A) & (B)
(D) None
 Answer

8. An IPV4 address is…..bits long


(A) 64
(B) 128
(C) 256
(D) 32
 Answer

9. How many classes are there in IPV4 addresses?


(A) 7
(B) 4
(C) 5
(D) 6
 Answer

10. What are the three types of addresses in IPV6?


(A) Class A, Class B, Class C
(B) Unicast, anycast, multicast
(C) Unicast, dualcast, multicast
(D) None
 Answer

AffairsCloud Recommends IBPSGuide Mock Test

IBPSGuide Yearly Platinum Package: 600+ Test Series

AffairsCloud Ebooks - Support us to Grow

Subscribe(Buy) Current Affairs PDF 2019 – Pocket, Study and Q&A (English & Hindi)
Subscribe(Buy) Puzzles & Seating Arrangement Questions PDF 2019 – New
Subscribe(Buy) Banking & Economy Awareness PDF 2019

 IT Officer Questions Networking Questions Professional Knowledge Questions

 Show Comments (6)

 Current Affairs 2019

 Current Affairs 2019

 Current Affairs 2019 PDF

 Current Affairs September 2019

 Current Affairs August 2019

 Current Affairs July 2019

 Current Affairs June 2019

 Current Affairs May 2019

 Current Affairs April 2019

 Current Affairs March 2019


COMPUTER NETWORKI… IT OFFICER QUESTIONS

Computer Networking Questions – Set 7


By SenDhil Last updated Jan 9, 2017 

Buy Current Affairs PDF 2019 - Click Here


Buy Puzzles Questions PDF 2019 - New

Dear Aspirants,

Welcome to the Professional Knowledge Section in A airscloud.com. Here we are providing sample questions
in Computer Networking. It will be useful for the upcoming IBPS SO IT officer and SBI Assistant
Manager(System) examinations. We have also included some important questions that are repeatedly asked in
previous exams.

Download DBMS Q&A PDF for IT Officers 

1. IEEE 802.3 standard used what method as the media access method?
(A) CSMA/CD
(B) CSMA/CA
(C) CDMA
(D) FDMA
 Answer

2. WEP stands for


(A) Wireless Equivalent Privacy
(B) Wired Equivalent Privacy
(C) Wired Equivalent Protocol
(D) Wireless Equivalent Protocol
 Answer

3. What is the key element of a Protocol?


(A) Syntax
(B) Semantics
(C) Timing
(D) All of the above
 Answer
4. Gigabit Ethernet has a data rate of
(A) 100 Mbps
(B) 1000 Mbps
(C) 500 Mbps
(D) None
 Answer

5. The datalink layer of Ethernet consists of


(A) LLC sublayer
(B) MAc sublayer
(C) Both (A) & (B)
(D) Only (B)
 Answer

6. What is the minimum & maximum frame length for 10 Mbps Ethernet?
(A) 32 bytes, 64 bytes
(B) 64 bytes, 128 bytes
(C) 64 bytes, 1518 bytes
(D) 32 bytes, 1518 bytes
 Answer

7. SNMP stands for


(A) Simple Network Management Protocol
(B) Sample Network Management Protocol
(C) Structured Network Management Protocol
(D) Security Network Management Protocol
 Answer

8. Which of the following refers to a group of standards that are still being developed as a part of overall
IEEE 802.11 WLAN support?
(A) 802.11i
(B) 802.11x
(C) Both (A) & (B)
(D) None of the above
 Answer

9. Which of the following is a security protocol designed to provide a wireless LAN with better security
and privacy?
(A) WEP
(B) SNMP
(C) WAP
(D) LDAP
 Answer

10. Which of the following is a timer used for Collision Avoidance (CA)?
(A) PCF
(B) MAC
(C) NAV(Network Allocation Vector)
(D) None of the above
Answer

AffairsCloud Recommends IBPSGuide Mock Test

IBPSGuide Yearly Platinum Package: 600+ Test Series

AffairsCloud Ebooks - Support us to Grow

Subscribe(Buy) Current Affairs PDF 2019 – Pocket, Study and Q&A (English & Hindi)
Subscribe(Buy) Puzzles & Seating Arrangement Questions PDF 2019 – New
Subscribe(Buy) Banking & Economy Awareness PDF 2019

 IT Officer Questions Networking Questions Professional Knowledge Questions

 Show Comments (9)

 Current Affairs 2019

 Current Affairs 2019

 Current Affairs 2019 PDF

 Current Affairs September 2019

 Current Affairs August 2019

 Current Affairs July 2019

 Current Affairs June 2019

 Current Affairs May 2019

 Current Affairs April 2019

 Current Affairs March 2019


COMPUTER NETWORKI… IT OFFICER QUESTIONS

Computer Networking Questions – Set 8


By SenDhil Last updated Jan 9, 2017 

Buy Current Affairs PDF 2019 - Click Here


Buy Puzzles Questions PDF 2019 - New

Dear Aspirants,

Welcome to the Professional Knowledge Section in A airscloud.com. Here we are providing sample questions
in Computer Networking. It will be useful for the upcoming IBPS SO IT officer and SBI Assistant
Manager(System) examinations. We have also included some important questions that are repeatedly asked in
previous exams.

Download DBMS Q&A PDF for IT Officers 

1. Communication in a Hybrid Fiber Coaxial (HFC) cable TV network can be


(A) unidirectional
(B) bidirectional
(C) multidirectional
(D) None of the above
 Answer

2. Circuit switching uses…..


(A) Space Division Switch
(B) Time Division Switch
(C) Either (A) or (B)
(D) None of the above
 Answer

3. ADSL stands for


(A) Asynchronous Digital Subscriber Line
(B) Asymmetric Digital Subscriber Line
(C) Advanced Digital Subscriber Line
(D) Asynchronous Digital Security Line
 Answer
4. Encryption and decryption of data are the responsibility of ……. layer
(A) Physical
(B) Datalink
(C) Transport
(D) Presentation
 Answer

5. What is the main function of transport layer in the OSI model?


(A) peer to peer message delivery
(B) node to node message delivery
(C) process to process message delivery
(D) None of the above
 Answer

6. OSI stands for…..


(A) Open Systems Interconnection
(B) Original Systems Interconnection
(C) Original Security Interconnection
(D) Open Software Interconnection
 Answer

7. In OSI model, as the data packet moves from the upper to the lower layers, headers are _______.
(A) added
(B) removed
(C) deleted
(D) edited
 Answer

8. Which of the following layer is the User Support layer?


(A) Session layer
(B) Presentation layer
(C) Application layer
(D) All of the above
 Answer

9. Error detection at the data link layer is achieved by…..


(A) Hamming code
(B) Cyclic Redundancy Code
(C) Bit stu ng
(D) synchronization
 Answer

10. Port address in TCP/IP is ….. bits long


(A) 16
(B) 32
(C) 64
(D) 128
 Answer

AffairsCloud Recommends IBPSGuide Mock Test

IBPSGuide Yearly Platinum Package: 600+ Test Series

AffairsCloud Ebooks - Support us to Grow

Subscribe(Buy) Current Affairs PDF 2019 – Pocket, Study and Q&A (English & Hindi)
Subscribe(Buy) Puzzles & Seating Arrangement Questions PDF 2019 – New
Subscribe(Buy) Banking & Economy Awareness PDF 2019

 IT Officer Questions Networking Questions Professional Knowledge Questions

 Show Comments (57)

 Current Affairs 2019

 Current Affairs 2019

 Current Affairs 2019 PDF

 Current Affairs September 2019

 Current Affairs August 2019

 Current Affairs July 2019

 Current Affairs June 2019

 Current Affairs May 2019

 Current Affairs April 2019

 Current Affairs March 2019

 Current Affairs February 2019

 Current Affairs January 2019


COMPUTER NETWORKI… IT OFFICER QUESTIONS

Computer Networking Questions – Set 9


By SenDhil Last updated Jan 9, 2017 

Buy Current Affairs PDF 2019 - Click Here


Buy Puzzles Questions PDF 2019 - New

Dear Aspirants,

Welcome to the Professional Knowledge Section in A airscloud.com. Here we are providing sample questions
in Computer Networking. It will be useful for the upcoming IBPS SO IT officer and SBI Assistant
Manager(System) examinations. We have also included some important questions that are repeatedly asked in
previous exams.

Download DBMS Q&A PDF for IT Officers 

1. An addressing method in which the IP address space is not divided into classes?
(A) Classful addressing
(B) Classless addressing
(C) Classless IDR
(D) None of the above
 Answer

2. The number of differences between the corresponding bits in a two data words is known as……
distance
(A) Hanning
(B) Hamming
(C) Hu man
(D) None of the above
 Answer

3. An Address Resolution Protocol (ARP) request is


(A) unicast
(B) anycast
(C) broadcast
(D) None of the above
 Answer

4. The splitting of a message into multiple packets at transport layer is known as….
(A) Fragmentation
(B) Segmentation
(C) Synchronization
(D) None of the above
 Answer

5. RARP stands for……


(A) Reverse Address Resolution Protocol
(B) Reverse Address Routing Protocol
(C) Reverse Address Re exive Protocol
(D) Resource Address Resolution Protocol
 Answer

6. The loss of signal’s energy due to the resistance of medium is called……


(A) Fragmentation
(B) Attenuation
(C) Synchronization
(D) None of the above
 Answer

7. In Wireless LAN’s, a time interval between two frames to control access to the channel is called…..
(A) Interframe space
(B) Interleaving
(C) Interior routing
(D) None of the above
 Answer

8. An array of switches that are used to reduce the number of cross points is called…..
(A) singlestage switch
(B) dualstage switch
(C) multistage switch
(D) None of the above
 Answer

9. An application protocol of TCP/IP that allows remote login is known as…….


(A) NCP
(B) NVT(Network Virtual Terminal)
(C) NAV
(D) None of the above
 Answer

10. TFTP stands for……


(A) Trivial File Transfer Protocol
(B) Temporary File Transfer Protocol
(C) Trunk File Transfer Protocol
(D) Transparent File Transfer Protocol
 Answer

AffairsCloud Recommends IBPSGuide Mock Test

IBPSGuide Yearly Platinum Package: 600+ Test Series

AffairsCloud Ebooks - Support us to Grow

Subscribe(Buy) Current Affairs PDF 2019 – Pocket, Study and Q&A (English & Hindi)
Subscribe(Buy) Puzzles & Seating Arrangement Questions PDF 2019 – New
Subscribe(Buy) Banking & Economy Awareness PDF 2019

 IT Officer Questions Networking Questions Professional Knowledge Questions

 Show Comments (6)

 Current Affairs 2019

 Current Affairs 2019

 Current Affairs 2019 PDF

 Current Affairs September 2019

 Current Affairs August 2019

 Current Affairs July 2019

 Current Affairs June 2019

 Current Affairs May 2019

 Current Affairs April 2019

 Current Affairs March 2019


COMPUTER NETWORKI… IT OFFICER QUESTIONS

Computer Networking Questions – Set 10


By SenDhil Last updated Jan 9, 2017 

Buy Current Affairs PDF 2019 - Click Here


Buy Puzzles Questions PDF 2019 - New

Dear Aspirants,

Welcome to the Professional Knowledge Section in A airscloud.com. Here we are providing sample questions
in Computer Networking. It will be useful for the upcoming IBPS SO IT officer and SBI Assistant
Manager(System) examinations. We have also included some important questions that are repeatedly asked in
previous exams.

1. The building block of a Wireless LAN as defined by IEEE 802.11 standard?


(A) BSS(Basic Service Set)
(B) ESS
(C) Both (A) & (B)
(D) None of the above
Answer

2. A protocol that provides configuration information from a table is called…..


(A) BGP
(B) BOOTP(Bootstrap Protocol)
(C) FTP
(D) None of the above 
Answer

3. CIDR stands for


(A) Code Inter Domain Routing
(B) Code Inter Division Routing
(C) Classless Inter Domain Routing
(D) Classful Inter Domain Routing
 Answer
4. In PPP, a three-way handshaking protocol used for authentication is known as……
(A) CHAP(Challenge Handshake Authentication Protocol)
(B) BOOTP
(C) FTP
(D) None of the above Answer

5. A technique in which a protocol used for address resolution is called……


(A) dynamic routing
(B) dynamic mapping
(C) exterior routing
(D) None of the above
 Answer

6. Which of the following converts user friendly names to IP addresses?


(A) Domain Name Space
(B) Domain Name System
(C) DHCP
(D) None of the above
 Answer

7. A protocol in which the sender sends one frame and stops until it receives confirmation from the
receiver?
(A) Stop and Wait ARQ
(B) Store and forward switch
(C) Stop and Wait Protocol
(D) None of the above
 Answer

8. Which of the following is an application service for retrieving a web document?


(A) HTML
(B) HTTP
(C) FTP
(D) None of the above
 Answer

9. You are in the process of analyzing a problem that requires you to collect and store TCP/IP
Packets.Which of the following utilities is best suited for this purpose?
(A) Performance Monitor
(B) Network Monitor
(C) NETSTAT
(D) NBTSTAT
 Answer

10. Which of the following protocol provides confidentiality and authentication for an e-mail?
(A) BGP
(B) BOOTP
(C) PGP(Pretty Good Privacy)
(D) None of the above
Answer

AffairsCloud Recommends IBPSGuide Mock Test

IBPSGuide Yearly Platinum Package: 600+ Test Series

AffairsCloud Ebooks - Support us to Grow

Subscribe(Buy) Current Affairs PDF 2019 – Pocket, Study and Q&A (English & Hindi)
Subscribe(Buy) Puzzles & Seating Arrangement Questions PDF 2019 – New
Subscribe(Buy) Banking & Economy Awareness PDF 2019

 IT Officer Questions Networking Questions Professional Knowledge Questions

 Show Comments (1)

 Current Affairs 2019

 Current Affairs 2019

 Current Affairs 2019 PDF

 Current Affairs September 2019

 Current Affairs August 2019

 Current Affairs July 2019

 Current Affairs June 2019

 Current Affairs May 2019

 Current Affairs April 2019

 Current Affairs March 2019


IT OFFICER QUESTIONS COMPUTER NETWORKI…

Computer Networking Questions – Set 11


By Aruna Last updated Jan 8, 2017 

Buy Current Affairs PDF 2019 - Click Here


Buy Puzzles Questions PDF 2019 - New

Dear Aspirants,

Welcome to the Professional Knowledge Section in A airscloud.com. Here we are providing sample questions
in Computer Networking. It will be useful for the upcoming SBI Assistant Manager(System) and RRB Officer
Scale – II(IT Officer) examinations. We have also included some important questions that are repeatedly asked
in previous exams.

1. __________ is a conceptual location at which one OSI layer can request the services of another OSI layer.
A. Entities
B. SAP(Service Access Point)
C. Peer Entities
D. All of the Above
E. None of the Above
Answer & Explanation

2. Which of the following protocol(s) is/are used for transferring data?


A. Connection oriented
B. Connection less services
C. Connectivity
D. Both (B) and (C)
E. Both (A) and (B)
Answer & Explanation

3. Which of the following layer provide the necessary functions to enable communication between
software application processes on different computers?
A. Physical layer
B. Data link layer
C. Network layer
D. Transport layer
E. None of the Above
 Answer & Explanation

4. Which of the following is a code that allows two software programs to communicate with each other?
A. TCP/IP
B. API(Application Program Interface)
C. UDP
D. All of the Above
E. None of the Above
Answer & Explanation

5. Which of the following is/are example(s) of data link layer?


A. Ethernet
B. Token Ring
C. FDDI
D. All of the Above
E. None of the Above
Answer & Explanation

6. TFTP stands for?


A. Trivial File Transfer Protocol (TFTP)
B. Transfer File Trivial Protocol (TFTP)
C. Trivial File Transit Protocol (TFTP)
D. Transfer File Transfer Protocol (TFTP)
E. Transit File Trivial Protocol (TFTP)
Answer & Explanation

7. ________ is a software application used within an Internet message handling system (MHS).
A. Mail Transfer Agent(MTA)
B. Message Transfer Agent(MTA)
C. Mail Transport Agent
D. All of the Above
E. None of the Above
Answer & Explanation

8. _________ refers to a standard used for transmitting IP data grams across IEEE 802 networks.
A. HTML
B. HTTP
C. Sub Network Access Protocol (SNAP)
D. All of the Above
E. None of the Above
 Answer & Explanation

9. ______ are used as the simplest form of error detecting code


A. Parity bits
B. Network bits
C. Data bits
D. All of the Above
E. None of the Above
 Answer & Explanation

10. ________ is the number of times a signal in a communications channel changes state or varies.
A. Bit rate
B. Baud rate
C. Net bit rate
D. All of the Above
E. None of the Above
 Answer & Explanation

AffairsCloud Recommends IBPSGuide Mock Test

IBPSGuide Yearly Platinum Package: 600+ Test Series

AffairsCloud Ebooks - Support us to Grow

Subscribe(Buy) Current Affairs PDF 2019 – Pocket, Study and Q&A (English & Hindi)
Subscribe(Buy) Puzzles & Seating Arrangement Questions PDF 2019 – New
Subscribe(Buy) Banking & Economy Awareness PDF 2019

 IT Officer Questions Professional Knowledge Questions

 Leave a comment

 Current Affairs 2019

 Current Affairs 2019


IT OFFICER QUESTIONS COMPUTER NETWORKI…

Computer Networking Questions – Set 12


By Aruna Last updated Jan 8, 2017 

Buy Current Affairs PDF 2019 - Click Here


Buy Puzzles Questions PDF 2019 - New

Dear Aspirants,

Welcome to the Professional Knowledge Section in A airscloud.com. Here we are providing sample questions
in Computer Networking. It will be useful for the upcoming SBI Assistant Manager(System) and RRB Officer
Scale – II(IT Officer) examinations. We have also included some important questions that are repeatedly asked
in previous exams.

1. Which of the following is a client/server protocol that automatically provides an Internet Protocol (IP)
host with its IP address?
A. Session Initiation Protocol
B. Trivial File Transfer Protocol
C. Secure Hypertext Transfer Protocol
D. Dynamic Host Con guration Protocol
E. None of the Above
 Answer & Explanation

2. ______ is a computer networking protocol that provides for automatic assignment of available Internet
Protocol (IP) routers to participating hosts.
A. Session Initiation Protocol
B. Virtual Router Redundancy Protocol
C. Secure Hypertext Transfer Protocol
D. Dynamic Host Con guration Protocol
E. None of the Above
 Answer & Explanation

3. Which of the following is a signaling protocol used to create, manage and terminate sessions in an IP
based network?
A. Session Initiation Protocol
B. Trivial File Transfer Protocol
C. Secure Hypertext Transfer Protocol
D. Dynamic Host Con guration Protocol
E. None of the Above
 Answer & Explanation

4. Which of the following is used to support virtual private networks (VPNs)?


A. SIP
B. TFTP
C. L2TP(Layer 2 Tunneling Protocol)
D. DHCP
E. None of the Above
Answer & Explanation

5. _______ provides a mechanism used to connect to, search, and modify Internet directories.
A. SIP
B. TFTP
C. L2TP
D. DHCP
E. LDAP(Light Weight Directory Access Protocol)
Answer & Explanation

6. Which is designed to exchange routing and reach ability information among autonomous systems
(AS) on the Internet?

A. Session Initiation Protocol


B. Border Gateway Protocol
C. Server Message Block Protocol
D. Dynamic Host Con guration Protocol
E. None of the Above
Answer & Explanation

7. __________ allows applications on a computer to read and write to files and to request services from
server programs in a computer network

A. Server Message Block (SMB) protocol


B. Border Gateway Protocol
C. Secure Hypertext Transfer Protocol
D. Dynamic Host Con guration Protocol
E. None of the Above
Answer & Explanation

8. ________ forms part of the Point-to-Point Protocol (PPP), within the family of Internet protocols.
A. SIP
B. TFTP
C. L2TP
D. DHCP
E. LCP(Link Control Protocol)
Answer & Explanation

9. Which of the following is an encapsulation of the Internet Protocol designed to work over serial ports
and modem connections?

A. SLIP(Serial Line Internet Protocol)


B. TFTP
C. L2TP
D. DHCP
E. LCP
Answer & Explanation

10. A specification that provides an inter operable framework for e-commerce is known as ___________
A. SLIP
B. IOTP(Internet Open Trading Protocol)
C. L2TP
D. DHCP
E. LCP
Answer & Explanation

AffairsCloud Recommends IBPSGuide Mock Test

IBPSGuide Yearly Platinum Package: 600+ Test Series

AffairsCloud Ebooks - Support us to Grow

Subscribe(Buy) Current Affairs PDF 2019 – Pocket, Study and Q&A (English & Hindi)
Subscribe(Buy) Puzzles & Seating Arrangement Questions PDF 2019 – New
Subscribe(Buy) Banking & Economy Awareness PDF 2019

 IT Officer Questions Professional Knowledge Questions

 Leave a comment
IT OFFICER QUESTIONS COMPUTER NETWORKI…

Computer Networking Questions – Set 13


By Aruna Last updated Jan 8, 2017 

Buy Current Affairs PDF 2019 - Click Here


Buy Puzzles Questions PDF 2019 - New

Dear Aspirants,

Welcome to the Professional Knowledge Section in A airscloud.com. Here we are providing sample questions
in Computer Networking. It will be useful for the upcoming SBI Assistant Manager(System) and RRB Officer
Scale – II(IT Officer) examinations. We have also included some important questions that are repeatedly asked
in previous exams.

1. Which of the following consists set of switches connected by physical links?


A. Circuit Switched Network
B. Datagram Network
C. Virtual Circuit Network
D. All of these
E. None of these
 Answer & Explanation

2. In _________, there is no resource reservation and the resources are allocated on demand.
A. Circuit Switched Network
B. Datagram Network
C. Virtual Circuit Network
D. All of these
E. None of these
 Answer & Explanation

3. A Virtual Circuit is a cross between a circuit switched network and ?


A. LAN
B. Datagram Network
C. MAN
D. Both (B) and (C)
E. None of these
 Answer & Explanation

4. Which of the following is an example for circuit switched Network?


A. Analog telephone network
B. Ethernet
C. Internet Protocol
D. User Datagram Protocol
E. None of the Above
 Answer & Explanation

5. Connection-oriented packet switching is also known as?


A. Circuit Switched Network
B. Datagram Network
C. Virtual Circuit Network
D. All of these
E. None of these
 Answer & Explanation

6. Connectionless packet switching is also known as?


A. Circuit Switched Network
B. Datagram Network
C. Virtual Circuit Network
D. All of these
E. None of these
 Answer & Explanation

7. Which of the following is an example for connection less protocol?


A. Frame Relay
B. X.25
C. Multi Protocol Label Switching
D. Transmission Control Protocol
E. Ethernet
 Answer & Explanation

8. Which of the following is an example for connection oriented protocol?


A. Frame Relay
B. X.25
C. Multi Protocol Label Switching
D. Transmission Control Protocol
E. All of these
 Answer & Explanation
9. Which of the following is a type of data-carrying technique for high-performance
telecommunications?
A. Ethernet
B. Multiprotocol Label Switching (MPLS)
C. Internet Protocol (IP)
D. User Datagram Protocol (UDP)
E. None of these
 Answer & Explanation

10. ATM stands for _______


A. Asymmetrical Transfer Mode
B. Asynchronous Transfer Mode
C. Asynchronous Transmission Mode
D. Asymmetrical Transmission Mode
E. None of these
 Answer & Explanation

AffairsCloud Recommends IBPSGuide Mock Test

IBPSGuide Yearly Platinum Package: 600+ Test Series

AffairsCloud Ebooks - Support us to Grow

Subscribe(Buy) Current Affairs PDF 2019 – Pocket, Study and Q&A (English & Hindi)
Subscribe(Buy) Puzzles & Seating Arrangement Questions PDF 2019 – New
Subscribe(Buy) Banking & Economy Awareness PDF 2019

 IT Officer Questions Professional Knowledge Questions

 Leave a comment

 Current Affairs 2019

 Current Affairs 2019

 Current Affairs 2019 PDF

 Current Affairs September 2019


IT OFFICER QUESTIONS COMPUTER NETWORKI…

Computer Networking Questions – Set 14


By Aruna On Jan 11, 2017 

Buy Current Affairs PDF 2019 - Click Here


Buy Puzzles Questions PDF 2019 - New

Dear Aspirants,

Welcome to the Professional Knowledge Section in A airscloud.com. Here we are providing sample questions
in Computer Networking. It will be useful for the upcoming SBI Assistant Manager(System) and IBPS SO(IT
Officer) examinations. We have also included some important questions that are repeatedly asked in previous
exams.

1. Which of the following is an artificial demarcation point or interface point between communicating
entities?
A. IP
B. POP(Point Of Presence)
C. ISP
D. All of these
E. None of these
 Answer & Explanation

2. A Point-Of-Presence(POP) usually includes ______


A. Routers
B. Frame Relays
C. Servers
D. ATM Switches
E. All of these
 Answer & Explanation

3. Which of the following protocol offers network stability that guarantees routers can quickly adapt to
send packets through another reconnection if one internet path goes down.?
A. HTTP
B. SMTP
C. UDP
D. BGP(Border Gateway Protocol)
E. None of these
 Answer & Explanation

4. BGP Stands for?


A. Balanced Gateway Protocol
B. Border Gateway Protocol
C. Broadband Gateway Protocol
D. Balanced Goal Protocol
E. Balanced Gate Protocol
 Answer & Explanation

5. Which of the following is a protocol for exchanging routing information between gateways within an
autonomous network?
A. HTTP
B. EGP
C. UDP
D. SMTP
E. IGP(Interior Gateway Protocol)
 Answer & Explanation

6. Which is commonly used between hosts on the Internet to exchange routing information?
A. HTTP
B. EGP(Exterior Gateway Protocol)
C. UDP
D. SMTP
E. IGP
 Answer & Explanation

7. Which of the following protocol provides administrators with a secure way to access a remote
computer?
A. HTTP
B. EGP
C. UDP
D. SSH(Secure Socket Shell)
E. IGP
 Answer & Explanation

8. Which of the following is an example for Interior Gateway Protocol (IGP)?


A. Open Shortest Path First (OSPF) protocol
B. Routing Information Protocol (RIP)
C. Border Gateway Protocol
D. Both (A) and (B)
E. None of these
 Answer & Explanation

9. Which of the following is an example for Exterior Gateway Protocol (EGP)?


A. Open Shortest Path First (OSPF) protocol
B. Routing Information Protocol (RIP)
C. Border Gateway Protocol
D. Both (A) and (B)
E. None of these
 Answer & Explanation

10. Which of the following is is a computer networking protocol for securing connections between
network application clients and servers over an insecure network, such as the internet?
A. SSL(Secure Socket Layer)
B. EGP
C. UDP
D. HTTP
E. IGP
 Answer & Explanation

AffairsCloud Recommends IBPSGuide Mock Test

IBPSGuide Yearly Platinum Package: 600+ Test Series

AffairsCloud Ebooks - Support us to Grow

Subscribe(Buy) Current Affairs PDF 2019 – Pocket, Study and Q&A (English & Hindi)
Subscribe(Buy) Puzzles & Seating Arrangement Questions PDF 2019 – New
Subscribe(Buy) Banking & Economy Awareness PDF 2019

 Computer Networks IT Officer Questions

 Leave a comment

 Current Affairs 2019


IT OFFICER QUESTIONS COMPUTER NETWORKI…

Computer Networking Questions – Set 15


By Aruna On Jan 18, 2017 

Buy Current Affairs PDF 2019 - Click Here


Buy Puzzles Questions PDF 2019 - New

Dear Aspirants,

Welcome to the Professional Knowledge Section in A airscloud.com. Here we are providing sample questions
in Computer Networking. It will be useful for the upcoming SBI Assistant Manager(System) and IBPS SO(IT
Officer) examinations. We have also included some important questions that are repeatedly asked in previous
exams.

1. Which of the following is the higher of the two data link layer sub layers defined by the IEEE?
A. LLC(Logical Link Control)
B. MAC
C. ISP
D. Both (A) and (B)
E. None of these
 Answer & Explanation

2. The LLC sub layer handles which of the following function(s)?


A. Error Control
B. Flow Control
C. Framing
D. MAC-sublayer
E. All of these
 Answer & Explanation

3. Which of the following is the IEEE standard specification for Ethernet.?


A. IEEE 802.15
B. IEEE 802.5
C. IEEE 802.4
D. IEEE 802.3
E. None of these
 Answer & Explanation

4. Which of the following is the IEEE standard specification for Bluetooth.?


A. IEEE 802.15
B. IEEE 802.5
C. IEEE 802.4
D. IEEE 802.3
E. None of these
 Answer & Explanation

5. Which of the following is the IEEE standard specification for WLAN?


A. IEEE 802.15
B. IEEE 802.5
C. IEEE 802.4
D. IEEE 802.3
E. IEEE 802.11
 Answer & Explanation

6. Which of the following is the IEEE standard specification for Token Bus?
A. IEEE 802.4
B. IEEE 802.5
C. IEEE 802.1
D. IEEE 802.3
E. IEEE 802.2
 Answer & Explanation

7. Which of the following is the IEEE standard specification for Token Ring?


A. IEEE 802.4
B. IEEE 802.5
C. IEEE 802.1
D. IEEE 802.3
E. IEEE 802.2
 Answer & Explanation

8. Which of the following is the IEEE standard specification for Bridging?


A. IEEE 802.15.4
B. IEEE 802.5
C. IEEE 802.1
D. IEEE 802.3
E. IEEE 802.2
 Answer & Explanation
9. Which of the following is the IEEE standard specification for Logical Link?
A. IEEE 802.15.4
B. IEEE 802.5
C. IEEE 802.4
D. IEEE 802.3
E. IEEE 802.2
 Answer & Explanation

10. Which of the following is the IEEE standard specification for ZigBee?
A. IEEE 802.15.4
B. IEEE 802.5
C. IEEE 802.4
D. IEEE 802.3
E. None of these
 Answer & Explanation

AffairsCloud Recommends IBPSGuide Mock Test

IBPSGuide Yearly Platinum Package: 600+ Test Series

AffairsCloud Ebooks - Support us to Grow

Subscribe(Buy) Current Affairs PDF 2019 – Pocket, Study and Q&A (English & Hindi)
Subscribe(Buy) Puzzles & Seating Arrangement Questions PDF 2019 – New
Subscribe(Buy) Banking & Economy Awareness PDF 2019

 Computer Networks IT Officer Questions

 Leave a comment

 Current Affairs 2019

 Current Affairs 2019

 Current Affairs 2019 PDF

 Current Affairs September 2019

 Current Affairs August 2019


Q&A PDF

Computer Questions & Answers

1) Computers that control processes, accept data in a continuous.....


(A) data traffic pattern
(B) data highway
(C) infinite loop
(D) feedback loop

2) A language reflects the way people think mathematically is.....


(A) cross platform programming
(B) functional
(C) event driven programming
(D) 3GL business programming

3) A mistake in an algorithm that causes incorrect results is called a....


(A) logical error
(B) syntax error
(C) procedural error
(D) compiler error

4) A device for changing the connection on a connector to a different configuration


is....
(A) a converter
(B) a component
(C) an attachment
(D) an adapter

5) Technique that is used to send more than one call over a single line is
(A) Digital transmission
(B) Infrared transmission
(C) Streaming
(D) Multiplexing

6) Which of the following would you find on LinkedIn?


(A) Games
(B) Connections
(C) Chat
(D) Applications

7) The method of Internet access that requires a phone line, but offers faster access
speeds than dial-up is the.....Connection
(A) Cable access
(B) Satellite access
(C) Fiber optic service
(D) Digital Subscriber Line (DSL)

8) ......is a form of denial of service attack in which a hostile client repeatedly sends
SYN packets to every port on the server using fake IP addresses.
(A) Cyber crime
(B) Memory shaving
(C) Synflooding
(D) Software Piracy

1|Page
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

9) A program either talk or music that is made available in digital format for
automatic download over the internet is called a.....
(A) wiki
(B) broadcast
(C) vodcast
(D) podcast

10) A USB communication device that supports data encryption for secure wireless
communication for notebook users is called a...
(A) USB Wireless Network adapter
(B) wireless switch
(C) wireless hub
(D) router

11) The term "user interface" refers to .....


(A) What the user sees on the screen and how they can interact with it
(B) How the operating system responds to user commands
(C) the means by which the user interacts with the peripheral devices on the computer.
(D) None of these.

12) The connection between your computer at home and your local ISP is called.....
(A) the last mile
(B) the home stretch
(C) the home page
(D) the vital mile

13) ....are attempts by individuals to obtain confidential information from you by


falsifying their identity through e-mails.
(A) Phishing trips
(B) Viruses
(C) Phishing scams
(D) Spyware scams

14) ERP is an acronym for....


(A)Enterprise Relationship planning
(B)Enterprise Resource planning
(C)Enterprise Reorder planning
(D)None.

15) Collecting personal information and effectively posing as another individual is


known as the crime of .....
(A) spooling
(B) spoofing
(C) hacking
(D) identity theft

16) The signal that a computer is waiting for a command from the user is....
(A) prompt
(B) event
(C) time slice
(D) interrupt

17) Physical security is concerned with protecting computer hardware from human
tampering & natural disasters and..... security is concerned with protecting
software from unauthorized tampering or damage.
2|Page
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

(A) data
(B) cyber
(C) internet
(D) metaphysical
18) Which ports connect special types of music instruments to sound cards?
(A) BUS
(B) CPU
(C) USB
(D) Musical Instrument Digital Interface (MIDI)

19) Where you are likely to find an embedded operating system?


(A) On a desktop operating system
(B) On a networked PC
(C) On a PDA
(D) On a Mainframe.

20) Which of the following places the common data elements in order from smallest
to largest?
(A) Bit, byte, character, record, field, file, database
(B) Database, file, record, field, character
(C) Character, file, record, field, database
(D) Character, field, record, file, database

21) Which protocol provides e-mail facility among different hosts?


(A) File Transfer Protocol (FTP)
(B) TELNET
(C) Simple Mail Transfer Protocol (SMTP)
(D) Simple Network Management Protocol (SNMP)

22) Which of the following memory is non-volatile?


(A) DRAM
(B) SRAM
(C) ROM
(D) None of the above

23) What is embedded system?


(A) The programme which arrives by being wrapped in box.
(B) The programme which is the permanent part of the computer
(C) The computer which is the part of a big computer.
(D) Some combination of computer hardware and software.

24) Which device connects a LAN to the Internet ?


(A) Adapter
(B) Repeater
(C) Router
(D) None of the above

25) EBCDIC stands for


(A) Extended Binary Coded Decimal Interchange Code
(B) Extended Bit Code Decimal Interchange Code
(C) Extended Bit Case Decimal Interchange Code
(D) Extended Binary Case Decimal Interchange Code

26) The first general purpose electronic digital computer in the world was?
(A) UNIVAC (Universal Automatic Computer)
3|Page
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

(B) EDVAC (Electronic Discrete Variable Automatic Computer)


(C) ENIAC (Electronic Numerical Integrator & Computer)
(D) EDSAC (Electronic Delay Storage Automatic Computer)

27) Signals can be analog or digital and a computer that processes the both type of
signals is known as?
(A) Analog computer
(B) Digital Computer
(C) Hybrid Computer
(D) Mainframe Computer

28) Human beings are referred to as Homo sapiens, which device is called Silico
Sapiens?
(A) Monitor
(B) Hardware
(C) Robot
(D) Computer

29) EBCDIC can code up to how many different characters?


(A) 256
(B) 16
(C) 32
(D) 64

30) Different components of the motherboard of a PC unit are linked together by


sets of parallel electrical conducting lines. What are these lines called?
(A) Conductors
(B) Buses
(C) Connectors
(D) Consecutive

31) Which is the first automatic electronic digital computer?


(A) ENIAC
(B) MARK I
(C) Z3
(D) ABC (Atanasoff –Berry Computer)

32) India’s first supercomputer is


(A) Cyber 205
(B) Aaditya
(C) Anupam
(D) PARAM 8000

33) The metal disks, which are permanently housed in, sealed and contamination
free containers are called?
(A) Hard disks
(B) Floppy disk
(C) Winchester disk
(D) Flexible disk

34) What was the name of the first commercially available microprocessor chip?
(A) Intel 308
(B) Intel 33
(C) Intel 4004
(D) Motorola 639
4|Page
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

35) The first digital computer built with IC chips was known as
(A) IBM 7090
(B) Apple - 1
(C) IBM System / 360
(D) VAX - 10

36) RATS stands for


(A) Regression Analysis Time Series
(B) Regression Analysis Time Sharing
(C) Real Analysis Series
(D) All of above

37) The magnetic storage chip used to provide non-volatile direct access storage of
data and that have no moving parts are known as
(A)Magnetic core memory
(B)Magnetic tape memory
(C)Magnetic disk memory
(D)Magnetic bubble memory

38) A computer program that converts an entire program into machine language is
called a/an
(A) Interpreter
(B) Simulator
(C) Compiler
(D) Commander

39) A language translator that analyses and executes the source code in-line-by-
line manner without looking at the entire program is called a/an
(A) Interpreter
(B) Simulator
(C) Compiler
(D) Commander

40) Who designed the first electronics computer (ENIAC)?


(A) Von Neumann
(B) John Eckert & John Mauchly
(C) Joseph M Jacquard
(D) None of the above

41) A device driver acts like a……. between the device & OS
(A) inverter
(B) converter
(C) translator
(D) None

42) Computers can be divided into…..major categories.


(A) Four ( Micro, Mini, Mainframe, Super)
(B) Three
(C) One
(D) None

43) SAN stands for


(A) Storage Area Network
(B) Super Array Network
5|Page
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

(C) Shared Area Network


(D) None

44) NAS stands for


(A) Network Area Service
(B) Network Attached Storage
(C) Network Attached Service
(D) None

45) To produce high quality graphics (hardcopy) in color, ……… is used


(A) RGB monitor
(B) Plotter
(C) Ink-jet printer
(D) Laser printer

46) Hardware or software designed to guard against unauthorized access to a


computer network is known as…..
(A) Hacker-proof program
(B) Firewall
(C) Hacker-resistant server
(D) None

47) The scrambling of code is known as


(A) Encryption
(B) a firewall
(C) Scrambling
(D) None

48) A type of message that web servers pass to your web browser when you visit
the website
(A) Cache
(B) Spam
(C) None
(D) Cookie

49) Software that you can use free of charge for a set period. After that you have to
buy it to keep working is known as
(A) Freeware
(B) Shareware
(C) Software
(D) None

50) A type of virus (malicious code) that looks for security loopholes in a system
and uses that to replicate itself is known as
(A) Worm
(B) Threat
(C) Trojan Horse
(D) None

51) RAID stands for________


(A) Reproduce Array of Intelligent Disks
(B) Reproduce Array of Inexpensive Disks

6|Page
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

(C) Redundant Array of Inexpensive Drives


(D) Redundant Array of Inexpensive Disks

52) Software that monitors your online computer activities is known as


(A) Malware
(B) Spyware
(C) Freeware
(D) None

53) Software that is made available at no cost and is sometimes used to entice a
user to purchase the unbranded version with no advertising.
(A) Malware
(B) Spyware
(C) Freeware
(D) None

54) Which is used to display one or more web pages within another normal web
page?
(A) IFRAME
(B) Hyperlink
(C) Home page
(D) None

55) What is the main difference between a mainframe and a super computer?
(A) Supercomputer is much larger than mainframe computers
(B) Supercomputers are much smaller than mainframe computers
(C) Supercomputers are focused to execute few programs as fast as possible while
mainframe uses its power to execute as many programs concurrently.
(D) None

56) storage area used to store data to a compensate for the difference in speed at
which the different units can handle data is
(A) Memory
(B) Buffer
(C) Accumulator
(D) None

57) Computer is free from tiresome and boardroom. We call it


(A) Accuracy
(B) Diligence
(C) Versatility
(D) None

58) Integrated Circuits (ICs) are related to which generation of computers?


(A) First generation
(B) Second generation
(C) Third generation
(D) None

59) Which type of computers uses the 8-bit code called EBCDIC?
(A) Minicomputers
(B) Microcomputers
(C) Mainframe computers
(D) None
7|Page
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

60) The ALU of a computer responds to the commands coming from

(A) Primary memory


(B) Control section
(C) External memory
(D) Cache memory

61) A physical connection between the microprocessor memory and other parts of
the microcomputer is known as
(A) Path
(B) Address bus
(C) Route
(D) All of the above

62) A technique used by codes to convert an analog signal into a digital bit stream
is known as
(A) Pulse code modulation
(B) Pulse stretcher
(C) Query processing
(D) Queue management

63) Before a disk drive can access any sector record, a computer program has to
provide the record’s disk address. What information does this address specify?
(A) Track number
(B) Sector number
(C) Surface number
(D) All of above

64) What is the responsibility of the logical unit in the CPU of a computer?
(A) To produce result
(B) To compare numbers
(C) To control flow of information
(D) To do math’s works

65) The terminal device that functions as a cash register, computer terminal, and
OCR reader is the?
(A) Data collection terminal
(B) OCR register terminal
(C) Video Display terminal
(D) POS terminal

66) A set of flip flops integrated together is called ____


(A) Counter
(B) Adder
(C) Register
(D) None of the above

67) A register organized to allow moving left or right operations is called a ____
(A) Counter
(B) Loader
(C) Adder
8|Page
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

(D) Shift register

68) How many address lines are needed to address each machine location in a 2048
x 4 memory chip?
(A) 10
(B) 11
(C) 8
(D) 12

69) Multi user systems provided cost savings for small business because they use a
single processing unit to link several
(A) Personal computers
(B) Workstations
(C) Dumb terminals
(D) Mainframes

70) The difference between memory and storage is that memory is _____ and
storage is __
(A) Temporary, permanent
(B) Permanent, temporary
(C) Slow, fast
(D) All of the above

71) Which of the following is the first computer to use Stored Program Concept?
(A) UNIVAC
(B) ENIAC
(C) EDSAC
(D) None of above

72) 1 nibble equals to


(A) 1 bits
(B) 2 bits
(C) 4 bits
(D) 8 bits

73) The most commonly used standard data code to represent alphabetical,
numerical and punctuation characters used in electronic data processing system is
called
(A) ASCII
(B) EBCDIC
(C) BCD
(D) All of the above

74) The term GIGO (Garbage In Garbage Out) is related to which characteristics of
computers?
(A) Speed
(B) Automatic
(C) Accuracy
(D) Reliability

75) Hard disk is coated on both sides with


(A) Magnetic metallic oxide
(B) Optical metallic oxide
(C) Carbon layer
(D) All of the above
9|Page
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

76) The contents of information are stored in


(A) Memory data register
(B) Memory address register
(C) Memory arithmetic registers
(D) Memory access register

77) The programs which are as permanent as hardware and stored in ROM is known
as
(A) Hardware
(B) Software
(C) Firmware
(D) ROM ware

78) Which of the following memories must be refreshed many times per second?
(A) Static RAM
(B) Dynamic RAM
(C) EPROM
(D) ROM

79) In which mode, the communication channel is used in both directions at the
same time?
(A) Full-duplex
(B) Simplex
(C) Half-duplex
(D) None of the above

80) Which of the printers used in conjunction with computers uses dry ink powder?
(A) Daisy wheel printer
(B) Line printer
(C) Laser printer
(D) Thermal printer

81) Daisy wheel printer is a type of


(A) Matrix printer
(B) Impact printer
(C) Laser printer
(D) Manual printer

82) Which of these is considered intelligent CASE tool?


(A) Workbench
(B) Toolkit
(C) Upper CASE
(D) Lower CASE

83) Origin of internet can be tracked from


(A) Satellite networks
(B) Radio networks
(C) ARPANET (Advanced Research Projects Agency Network)
(D) None

84)…… is used by public & private enterprises to publish and share financial
information with each other and industry analysts across all computer platforms &
the Internet.

10 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

(A)Extensible Markup Language (XML)


(B) Extensible Business Reporting Language (XBRL)
(C) Enterprise Application Integration (EAI)
(D) None

85) System proposal is prepared in …… phase of SDLC.


(A) Conception
(B) Initiation
(C) Analysis
(D) Design

86) A data warehouse


(A) Contains numerous naming conventions and formats
(B) Is organized around important subject areas
(C)Contains only current data
(D)None

87) “>” symbol in DOS commands is used to


(A) Compare two values
(B) Redirect Input
(C) Redirect Output
(D) None

88) To connect networks of similar protocols, …….. are used


(A) Routers
(B) Gateways
(C) Bridges
(D) None

89)……….. is one reason for problems of data integrity


(A) Data availability constraints
(B) Data inconsistency
(C) Data redundancy
(D) None

90) Which of the following is an advantage of mounting an application on the web?


(A) the possibility of 24-hour access for users
(B) creating a system that can extend globally
(C) standardizing the design of the interface
(D) All of these

91) Which of the following domains is used for profit businesses?


(A) .com
(B) .edu
(C) .net
(D) None

92) Which of the following domains is used for non-profit organizations?


(A) .org
(B) .edu
(C) .net
(D) None

93) Browsers can be classified into two types. They are

11 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

(A) Graphical & Text


(B) Graphical & Navigational
(C) Text & Pictorial
(D) None

94) The displayed data over internet can be classified into two types. They are
(A) Static & Dynamic
(B) Graphical & Text
(C) Data & Voice
(D) None

95) Which is an open source development environment to develop dynamic web


pages?
(A) PHP (Hypertext Preprocessor)
(B) XML
(C) VB Script
(D) None

96) A protocol that allows a user to log on to a remote computer which is also
known as remote login is…..
(A) FTP
(B) Telnet
(C) HTTP
(D) None

97) A set of rules that enables a user to log on to another computer and transfer
information between it & his/ her computer.
(A) HTTP
(B) FTP
(C) WWW
(D) None

98) PSTN stands for


(A) Public Switched Transformation Network
(B) Public Switched Telephone Network
(C) Public Serviced Telnet Network
(D) None

99) Home Page is also known as


(A) Index Page
(B) Front Page
(C) Back Page
(D) None

100) GPRS stands for


(A) Global Packet Radio Service
(B) Global Positioning Radio Service
(C) General Packet Radio Service
(D) None

101) GSM stands for


(A) Global System for Mobile
(B) Global Service for Mobile
12 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

(C) Global System for Mobile communication


(D) None
102) TCP stands for
(A) Transmission Control Protocol
(B) Telnet Control Protocol
(C) Transmission Channel Protocol
(D) None

103) Proprietary Software is also called as


(A) Closed Source Software
(B) Open Source Software
(C) Commercial Software
(D) None

104) A product that is owned exclusively by a single company that can only function
properly, if it is used with other products owned by the same company?
(A) Proprietary Software
(B) Public Domain Software
(C) Commercial Software
(D) None

105) Freeware can be classified into four types. It includes


(A) Donationware, Postcardware
(B) Abandonware, Adware
(C) Both (A) & (B)
(D) None

106) Which of the following activity can be termed as software piracy?


(A) Soft loading
(B) Counterfeiting
(C) Renting
(D) All of these

107) Linux is a type of ……….. Software


(A) Open Source
(B) Public Domain
(C) Commercial
(D) None

108) A coding language that is compatible with windows servers which is used for
increased functionality on a website or to work with a database
(A) HTML
(B) ASP
(C) XML
(D) None

109) A code that represents English characters as numbers and ranging from 0 to
127.
(A) ASCII
(B) EBCDIC
(C) BCD
(D) All of above

13 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

110) An email feature, which is used to send a copy of an email to one or many
other people at the same time that you are sending it to the main recipient/s is
called
(A) CC
(B) BCC
(C) To
(D) None

111) An email feature which is used to send someone a BCC email, their email
address will not show in the "to" field
(A) CC
(B) BCC
(C) CC & BCC
(D) None

112) GUI stands for


(A) Graphic Uninstall/Install
(B) Graphical User Interface
(C) General Utility Interface
(D) None

113) A….. is a design tool that graphically shows the logic in a solution algorithm.
(A) Hierarchy Chart
(B) Flow Chart
(C) Structure Chart
(D) None

114) Programs designed to perform specific tasks related to managing computer


resources are called
(A) System Software
(B) Utility Software
(C) Application Software
(D) None

115) A file that contains definitions of the paragraph and character styles for your
document and all things you customized like toolbars and menus is called a…….
(A) guide
(B) prompt
(C) template
(D) None

116) Programs designed specifically to address general purpose applications &


special-purpose applications are called
(A) System Software
(B) Application Software
(C) Operating System
(D) None

117)A ….. contains buttons & menus that provide quick access to commonly used
commands.
(A) menubar
(B) toolbar
(C) window
(D) None
14 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

118) What is the split – MAC Architecture?


(A) The split-MAC architecture uses MAC addresses to create a forward/filter table and break
up collision domains.
(B) The split-MAC architecture uses MAC addresses to create a forward/fliter table
(C) Both (A) & (B)
(D) None

119) In …..normal form, all non-key fields of data structure are dependent on the
whole key.
(A) First
(B) Second
(C) Third
(D) None

120) Which of the following are tasks that may be completed when configuring your
e-mail client?
(A) Provide the IP address of your ISP’s mail server
(B) Provide the name of your e-mail account
(C) All of these
(D) None of these

121) A pixel is a……


(A) picture element or dot on a screen
(B) point of ink on a laser printed page
(C) point of ink on an ink jet printed page
(D) None

122) Expansion cards are inserted into


(A) CPU
(B) Slots
(C) Peripheral devices
(D) None

123)…….. is a communication technology used by some incoming mail servers.


(A) TCP
(B) POP3
(C) FTP
(D) None

124) Which of the following format for storing & backing up computer data on tape
that evolved from Digital Audio Tape (DAT) technology?
(A) Data Aggregation
(B) Digital Data Storage
(C) Virtual Tape System
(D) None

125) The two basic parts of URLs are


(A) TCP & IP
(B) the protocol & the domain name
(C) TCP & FTP
(D) None

126) The storage locations in the internal storage of a CPU is called


(A) reference points
15 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

(B) addresses
(C) locations
(D) None

127) The …… database is the most widely used database structure


(A) General
(B) Standard
(C) Relational
(D) None

128) Mail from unwanted senders can be blocked by…….


(A) e-mailing them & asking to be removed from the list
(B) using mail filters
(C) clicking the unsubscribe link
(D) None

129) ATM machines run ……. OS


(A) Open Source
(B) Closed Source
(C) embedded
(D) None

130) Which of the following is possible with open architecture?


(A) Hot swapping of devices
(B) A minimum of six new devices to be added to a computer
(C) Users to upgrade and add new devices as they come on the market
(D) None

131) The fraudulent practice of sending emails purposing to be from reputable


companies in order to induce individuals to reveal personal information(Credit &
Debit card details) is called
(A) Hot swapping of devices
(B) Pharming
(C) Phishing
(D) None

132) NIC stands for


(A) Network Internal Card
(B) Network Interconnection Channel
(C) Network Interface Card
(D) None

133) ---- Is the Virus that overwrites the files or a few parts being replaced?
(A) Virus
(B) File infectors
(C) worm
(D) None

134) A dynamic website that is normally database driven and which enables the
owner/user to manage the content of their own website without needing to know
any coding at all is known as
(A) Content Management System (CMS)
(B) ASP
(C) DNS
16 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

(D) None

135) An Internet service that translates domain names to the IP addresses is called
(A) CMS
(B) ASP
(C) DNS
(D) None

136) A hacker installs malicious code on a personal computer or server. This code
then redirects clicks you make on a Web site to another fraudulent Web site without
your consent or knowledge. It is known as….
(A) Phishing
(B) Smishing
(C) Pharming
(D) None

137) The act of using the telephone in an attempt to scam the user into
surrendering private information that will be used for identity theft.
(A) Pharming
(B) Smishing
(C) Vishing
(D) None

138) A type of phishing attack where mobile phone users receive text messages
containing a Web site hyperlink is called
(A) Pharming
(B) Smishing
(C) Vishing
(D) None

139) The creation of Internet Protocol (IP) packets with a forged source IP
address, with the purpose of concealing the identity of the sender or impersonating
another computing system is called …………..
(A) Pharming
(B) Spoofing
(C) Vishing
(D) None

140) A malware program that can be used by a black hat cracker to remotely take
control of a system for further attacks like spam emails or Denial of Service attacks,
without a user’s knowledge is called……
(A) Zombie
(B) Spoofing
(C) Vishing
(D) None

141) Ethical hackers who use their skill to secure the integrity of computer systems
or networks is called
(A) Black Hat
(B) White Hat
(C) Green Hat
(D) None

17 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

142) A type of malicious software that is activated each time your system boots up.
This malicious software difficult to detect because they are activated before your
system's Operating System has completely booted up is called
(A) Phishing
(B) Rootkits
(C) Pharming
(D) None

143) Spam over instant messenger is called spim while spam over Internet
telephony is known as
(A) Malware
(B) Spit
(C) Pharming
(D) None

144) The unauthorized activities of malicious software is called


(A) Pharming
(B) Payload
(C) Phishing
(D) None

145) Unauthorized access to restricted systems or resources is referred as


(A) Pharming
(B) Penetration
(C) Phishing
(D) None

146) Unauthorized access to information by using a terminal that is already logged


on with an authorized ID is called
(A) Piggybacking
(B) Penetration
(C) Phishing
(D) None

147) Modifying data in a Domain Name System (DNS) server so that calls to
particular Websites or even entire domains are misdirected for fraudulent purposes
is termed as
(A) DNS cache poisoning
(B) Penetration
(C) Phishing
(D) None

148) Any deliberate damage to operations or equipments is called


(A) Piggybacking
(B) Sabotage
(C) Phishing
(D) None

149) Sending large numbers of unwanted e-mail messages to a single recipient or


to a group of such recipients is termed as
(A)Logic bomb
(B) Mail bombing
(C) Time bomb
(D) None

18 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

150) Malicious modification or destruction of data such as changing information on


Web sites is called
(A) Super zapping
(B) Vandalism
(C) Spamming
(D) None
151) Overwhelming or saturating resources on a target system to cause a
reduction of availability to legitimate users is termed as
(A)Distributed DoS attack
(B) Denial of Service (DoS) attack
(C) Data Diddling
(D) None

152) Modifying data for fun and profit is defined as


(A)Distributed DoS attack
(B) Denial of Service (DoS) attack
(C) Data Diddling
(D) None

153) Internet-mediated attack accomplished by enlisting the services of many


compromised systems to launch a denial of service (DoS) is termed as
(A)Distributed DoS attack
(B) Denial of Service (DoS) attack
(C) Data Diddling
(D) None

154) Creating a false identity using someone else’s identifying information


(A)Distributed DoS attack
(B) Identity Theft
(C) Data Diddling
(D) None

155) A program or batch file that waits for a specific time before causing damage
is……
(A)Logic bomb
(B) Time bomb
(C) Mail bombing
(D) None

156) A method for exploiting a vulnerability to take control of a system or


otherwise compromise it is termed as…….
(A)Logic bomb
(B) Exploit
(C) Mail bombing
(D) None

157) The most widely used type of database management system is the
(A) Flat database.
(B) Network database.
(C) Relational database
(D) Hierarchical database.

158) Which of the following will connect you to the Internet?


(A)HTTP
(B) Internet service provider
19 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

(C) A network connection


(D) None

159) A method in which multiple communication devices are connected to one


another efficiently is known as……
(A) Switching
(B) Redundancy
(C) Capacity
(D) None

160) What is considered as the 'backbone' of the World Wide Web?


(A) URL
(B) HTML
(C) HTTP
(D)None

161) MIME stands for


(A) Multipurpose Internet Mail Extension
(B) Multicasting Internet Mail Extension
(C) Multiple Internet Mail Extension
(D) None

162) FPI stands for____


(A) Figure per inch
(B) Frames per inch
(C) Faults per inch
(D) None

163) The process of analyzing large data sets in search of new, previously
undiscovered relationships is known as:
(A) data mining
(B) data marting
(C) data maintenance
(D) data warehousing

164) Collection of interrelated data and set of program to access them is called
(A) Database
(B) Database Management System
(C) Data Structure
(D) data warehousing

165) A repository of data that is designed to serve a particular community of


knowledge workers is called
(A) datamart
(B) data maintenance
(C) data warehousing
(D) None

166) Keys that are used in combination with some other key, they have been
programmed to perform certain tasks is called
(A) Function keys
(B) Alphanumeric keys
(C) Modifier keys( Alt, Ctrl)
(D) None

20 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

167) A key that is used to alternate the input mode of a group of keys on a
keyboard is known as
(A) Function keys
(B) Alphanumeric keys
(C) Toggle Keys (Caps Lock, Nums Lock)
(D) None
168) Networking can be classified into two types. It includes
(A) Server-based networking (A central Server)
(B) Peer to Peer networking (Group of computers that perform both Server & Client function)
(C) Both (A) & (B)
(D) None

169) Which is used to connect a computer to the cabling used in LAN?


(A) Network Interface Card (or) Network Adapter
(B) Router
(C) Modem
(D) None

170) A device which converts data between the analog form used on telephone
lines & the digital form used on computers is………
(A) Network Interface Card (or) Network Adapter
(B) Router
(C) Modem (Modulator Demodulator)
(D) None

171) A relay or interconnecting device that is used to join two or more LANs is
called
(A) Network Interface Card (or) Network Adapter
(B) Router
(C) Bridge
(D) None

172) A device that regenerates the signal transmitted on a cable in a network is


called
(A) Repeater
(B) Router
(C) Bridge
(D) None

173) A networking device that is used to receive signals from one Computer &
transmit them on to other computers in a network is called……..
(A) Repeater
(B) Hub
(C) Bridge
(D) None

174) Hub can be divided into two types. It includes……


(A) Active Hub (Acts as a Repeater – regenerates & sends out a stronger signal)
(B) Passive Hub (Acts as a Junction box – Splits incoming signals for transmission)
(C) Both (A) & (B)
(D) None

175) An intelligent Hub that has the ability to determine the destination of a packet
sent across the network is called………
(A) Repeater
21 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

(B) Switch
(C) Bridge
(D) None

176) A most Sophisticated relay device used in a network that can be used to
interconnect systems with different protocols, formatting languages and
architecture is called………
(A) Gateway
(B) Switch
(C) Bridge
(D) None

177) CSMA/CD stands for


(A) Carrier Sense Multiple Access with Correction Detection
(B) Code Sense Multiple Access with Collision Detection
(C) Carrier Sense Multiple Access with Collision Detection
(D) None

178) A…… is required at each end to absorb the signal so that it does not reflect
back across the bus.
(A) gateway
(B) terminator
(C) bridge
(D) None

179) Bus Topologies can be classified into two types. It includes


(A) Regular Bus
(B) Local Bus
(C) Both (A) & (B)
(D) None

180) A list of rules for transferring data over a network is called?


(A) Protocol
(B) Program code
(C) Rules
(D) None

181) Star topologies are normally implemented using a


(A) Unshielded Twisted Pair (UTP) cable
(B) Twisted Pair cable
(C) Fiber Optic Cable
(D) None

182) A set of stations connected serially by cable is known as


(A) Star topology
(B) Bus topology
(C) Ring topology
(D) None

183) OSI stands for


(A) Open Systems Interconnection
(B) Open Source Interconnection
(C) Open Service Interconnection
(D) None

22 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

184) Layer which deals with the transportation of binary data and defines cable &
electrical specifications is known as……….
(A) Data Link Layer
(B) Physical Layer
(C) Session Layer
(D) None

185) Layer which converts data frames into bits and also convert bits into frames is
known as……….
(A) Data Link Layer
(B) Transport Layer
(C) Session Layer
(D) None

186) Layer which deals with translation of logical & physical addresses &
determines route from source to destination & also control network traffic is known
as……….
(A) Network Layer
(B) Transport Layer
(C) Session Layer
(D) None

187) Layer which manages flow control & ensures reliable delivery of data packets
in sequence with no losses or duplications is known as………
(A) Presentation Layer
(B) Transport Layer
(C) Session Layer
(D) None

188) Layer which establishes, maintains & terminates a connection while


communicating with other client is known as………
(A) Presentation Layer
(B) Transport Layer
(C) Session Layer
(D) None

189) Layer which translates data format & deals with compression of data and
network security is known as………
(A) Presentation Layer
(B) Application Layer
(C) Session Layer
(D) None

190) Layer which is the user interface to access the network services such as file
transfer/ database access is known as………
(A) Presentation Layer
(B) Application Layer
(C) Session Layer
(D) None

191) A long message that needs to be transmitted is broken into smaller packets of
fixed size for error free transmission is termed as……..
(A) Data Sequencing
23 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

(B) Flow Control


(C) Error control
(D) None

192) ICMP stands for


(A) Internet Control Message Protocol
(B) Internet Connection Management Protocol
(C) Internet Control Management Protocol
(D) None

193) IDRP stands for


(A) ICMP Repeater- Discovery Protocol
(B) ICMP Router- Discovery Protocol
(C) IDRP Router- Discovery Protocol
(D) None

194)RSS Stands for


(A) Rich Site Summary
(B) Really Simple Syndication
(C) (A) or (B)
(D) None

195) What is the full form of UDP?


(A) Upper Divisional Protocol
(B) User Datagram Protocol
(C) Under Divisional Protocol
(D) None

196) An Interface refers to a specification by which programs can communicate


with a web server is called
(A) Graphical User Interface (GUI)
(B) Musical Instrument Digital Interface (MIDI)
(C) Common Gateway Interface (CGI)
(D) None

197) VoIP stands for


(A) Video Over Internet Protocol
(B) Voice Over Internet Protocol
(C) Voice On Internet Protocol
(D) None

198) The two application protocols most commonly associated with


(A) Network File System (NFS)
(B) Common Internet File System (CIFS)
(C) Both (A) & (B)
(D) None

199) An attacker outside your network pretends to be a part of your network or


legal terminal is called…
(A) Password Attacks
(B) IP Spoofing
(C) Identity Theft
(D) None

24 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

200) A reliability & flow control technique where the source sends one packet,
starts a timer and waits for an acknowledgement before sending a new packet is
called
(A) Positive Acknowledgement Retransmission (PAR)
(B) Checksum
(C) Routing
(D) None

201) Booting can be divided into two types. They are


(A) Cold Booting
(B) Warm Booting
(C) (A) & (B)
(D) None

202) What is booting?


(A) When a computer is switched on & the OS gets loaded from hard disk to main memory
(B) When a computer is switched on & the OS gets loaded from CPU to main memory
(C) (A) or (B)
(D) None

203) What is Warm booting?


(A) When a computer is turned on after it has been completely shut down.
(B) When a computer is restarted by pressing the restart button or pressing (ctrl + Alt + Del)
key.
(C) (A) or (B)
(D) None.

204) which of the following is a function of Operating System (OS)?


(A) Process & Memory Management
(B) File Management
(C) Input/Output Management
(D) All of the above

205) which of the following is an example of Single User Operating System?


(A) MS-DOS
(B) Windows 9X
(C) (A) & (B)
(D) None

206) Which of the following is an example of Multi User Operating System?


(A) UNIX
(B) LINUX
(C) Windows 2000/2007
(D) (A) & (B) &(C)

207) What is Multi – Tasking Operating System?


(A) More than one processes can be executed concurrently
(B) Processing is done with a time constraint
(C) A type of OS which do not interact with a computer directly.
(D) An OS which use multiple central processors to serve multiple real time applications.

208) What is Real Time Operating System (RTOS)?


(A) More than one processes can be executed concurrently.
(B) Processing is done with a time constraint
25 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

(C) A type of OS which do not interact with a computer directly.


(D) An OS which use multiple central processors to serve multiple real time applications.

209) What is Batch Processing Operating System (RTOS)?


(A) More than one processes can be executed concurrently.
(B) Processing is done with a time constraint
(C) A type of OS which do not interact with a computer directly.
(D) An OS which use multiple central processors to serve multiple real time applications.

210) What is Distributed Operating System (RTOS)?


(A) More than one processes can be executed concurrently.
(B) Processing is done with a time constraint
(C) A type of OS which do not interact with a computer directly.
(D) An OS which uses multiple central processors to serve multiple real time applications.

211) Core of the OS which supports the process by dividing a path to peripheral
devices?
(A) Kernel
(B) Shell
(C) Fork
(D) None

212) The program which interprets commands given by the user?


(A) Kernel
(B) Shell
(C) Fork
(D) None

213) A system call of OS which is used to create a new process is known as?
(A) Kernel
(B) Shell
(C) Fork
(D) None

214) A process which is not executing due to any waiting event is called?
(A) Kernel
(B) Shell
(C) Deadlock
(D) None

215) Which provides an interface between process & OS?


(A) Kernel
(B) System Calls
(C) Deadlock
(D) None

216) User Interface can be divided into two types. They are
(A) Graphical User Interface
(B) Character User Interface
(C) (A) & (B)
(D) None

217) CLI stands for


(A) Character Line Interface
(B) Command Line Interface
26 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

(C) Character Level Interface


(D) None

218) In DOS, the DIR command is used


(A) to display contents of a file
(B) to delete files
(C) to display of files & subdirectories
(D) None

219) which one of the following is an MS-DOS external command?


(A) COPY
(B) FORMAT
(C) DIR
(D) None

220) Grouping & processing all of a firm’s transactions at one time is called,
(A) batch processing
(B) a real time system
(C) a database management system
(D) None

221) ………. is a feature for scheduling & multi-programming to provide an


economical interactive system of two or more users.
(A) time tracing
(B) time sharing
(C) multi-tasking
(D) None

222) In Windows ME, what does ME stands for?


(A) Micro-Expert
(B) Millennium-Edition
(C) Multi-Expert
(D) None

223) There are a total of……….actions button in PowerPoint.


(A) 12
(B) 15
(C) 18
(D) None

224) Attributes can be defined for


(A) pages
(B) entity
(C) macro
(D) None

225) What is the default size of the data type in MS Access?


(A) 50
(B) 60
(C) 70
(D) None

226)……. means that the data contained in a database is accurate & reliable
(A) Data redundancy
(B) Data integrity
27 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

(C) Data consistency


(D) None

227) The smallest unit of information about a record is called a……


(A) cell
(B) field
(C) record
(D) None.

228) Which combines efficient implementation techniques that enable them to be


used in extremely large database?
(A) Data Mining
(B) Data Manipulation
(C) Data reliability
(D) None.

229) A program that generally has more user-friendly interface than a DBMS is
called a
(A) back end
(B) front end
(C) form
(D) None.

230) A collection of conceptual tools for describing data, relationships, semantics &
constraints is referred as….
(A) data model
(B) ER model
(C) DBMS
(D) None.

231) Which of the following contains information about a single ‘entity’ in the
database like a person, place, event or thing?
(A) query
(B) form
(C) record
(D) None.

232)Dr.EF Codd represented……. rules that a database must obey if it has to be


considered truly relational.
(A) 4
(B) 8
(C) 12
(D) None.

233)…….. is one reason for problems of data integrity


(A) Data availability constraints
(B) Data redundancy
(C) Data reliability
(D) None.

234) ……… provides total solutions to reduce data redundancy, inconsistency,


dependence & unauthorized access of data.
(A) Table
(B) Protection password
28 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

(C) Data reliability


(D) None.

235) The particular field of a record that uniquely identifies each record is called the
(A) primary field
(B) key field
(C) master field
(D) None.

236)…….. are distinct items that don’t have much meaning to you in a given answer
(A) Fields
(B) Data
(C) Queries
(D) None.

237) A collection of related files is called………..


(A) field
(B) record
(C) database
(D) None.

238) A logical schema


(A) is the entire database
(B) is a standard way of organizing information into accessible part
(C) (A) & (B)
(D) None.

239) In the relational modes, cardinality is termed as


(A) number of tuples
(B) number of tables
(C) (A) & (B)
(D) None.

240) To locate a data item for storage is


(A) field
(B) fetch
(C) feed
(D) None.

241) An E-R diagram is a graphic method of presenting


(A) entity classes & their relationships
(B) primary keys & their relationships
(C) primary keys & their relationships to instances
(D) None.

242) An entity set that does not have sufficient attributes to form a primary key, is
a…..
(A) primary entity set
(B) weak entity set
(C) simple entity set
(D) None.

243) A computer checks …….. of username & password for a match before granting
access.
29 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

(A) website
(B) network
(C) database
(D) None.

244) ….. is a primary key of one file that also appears in another file?
(A) Physical key
(B) Foreign key
(C) Logical key
(D) None.

245) ……. is an invalid type of database key?


(A) Structured Primary key
(B) Atomic Primary key
(C) Logical key
(D) None.

246) Key to represent relationship between tables is called


(A) Physical key
(B) Foreign key
(C) Logical key
(D) None.

247) In ER diagram; relationship type is represented by


(A) rectangle
(B) diamond
(C) ellipse
(D) None.

248) In a relational database, a data structure that organizes the information about
a single topic into rows & columns, is….
(A) block
(B) record
(C) tuple
(D) table

249) Hub is associated with…….. network


(A) bus
(B) ring
(C) star
(D) mesh

250) Multiplexing involves…….path and…….. channel


(A) single path & multiple channel
(B) Single path & single channel
(C) multiple path & multiple channel
(D) mesh

251) P2P is a…… application architecture


(A) distributed
(B) client/server
(C) 1-tier
(D) None

252) In OSI architecture, the routing is performed by


30 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

(A) network layer


(B) data link layer
(C) transport layer
(D) None

253) Which of the following is considered a broad band communication channel?


(A) Coaxial Cable
(B) Fiber Optics Cable
(C) Microwave Circuits
(D) All of these

254) How many bits are there in the Ethernet address?


(A) 48 bits
(B) 64 bits
(C) 16 bits
(D) None

255) Ethernet, token ring and token bus are types of


(A) LAN
(B) WAN
(C) MAN
(D) None

256) Which of the following items is not used in LANs?


(A) Interface card
(B) cable
(C) computer
(D) Modem

257) Which is the name of the network topology in which there are bidirectional
links between each possible nodes?
(A) Mesh
(B) Ring
(C) Bus
(D) None

258) An alternate name for the completely interconnected network topology is


(A) Mesh
(B) Ring
(C) Bus
(D) None

259) Telnet is………based computer protocol


(A) sound
(B) image
(C) text
(D) None

260) Through………an administrator or another user can access someone else’s


computer remotely.
(A) Web server
(B) Web application
(C) telnet
(D) None

31 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

261) How many ways you can save a document?


(A) 5
(B) 4
(C) 3
(D) None
262) The maximum zoom % in MS Power Point is…….
(A) 400
(B) 100
(C) 200
(D) None

263) In Excel, charts are created using which option?


(A) Pie Chart
(B) Chart Wizard
(C) Bar Chart
(D) None

264) In order to include picture data type must be?


(A) OLE
(B) hyperlink
(C) (A) or (B)
(D) None

265) A…….. is the term used when a search engine returns a web page that
matches search criteria
(A) blog
(B) hit
(C) link
(D) None

266) Which is required to create an html document?


(A) Internet
(B) text editor
(C) Browser
(D) None

267) Which of the following will be used if a sender of e-mail wants to bold, italics
etc, the text message?
(A) Rich text
(B) Rich signature
(C) Reach format
(D) None

268) Which stores information about the user’s web activity?


(A) Spam
(B) Cookie
(C) Cache
(D) None

269) Each IP packet must contain


(A) Source address
(B) destination address
(C) (A) & (B)
(D) None

32 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

270) Vendor-created program modifications are called———


(A) patches
(B) antiviruses
(C) holes
(D) None
271) If your computer rebooting itself then it is likely that
(A) It has a virus
(B) It does not have enough memory
(C) There has been a power surge
(D) None

272) The …….. of a Threat measures its potential impact on a System


(A) vulnerabilities
(B) degree of harm
(C) susceptibility
(D) None

273) A digital signature is


(A) scanned signature
(B) encrypting information
(C) signature in binary form
(D) None

274) A firewall operated by


(A) the pre-purchase phase
(B) isolating intranet from extranet
(C) screening packets to/from the network & provide controllable filtering of network traffic.
(D) None

275) Which one of the following is a cryptographic protocol used to secure http
concession?
(A) Transport Layer Security
(B) Explicit Congestion Notification
(C) Resource Reservation Notification (RRN)
(D) None

276) Which of the following inputs a computer’s memory, but unlike a virus, it does
not replicate itself?
(A) Trojan Horse
(B) Logic bomb
(C) Firewall
(D) None

277) Which one of the following is a key function of firewall?


(A) Monitoring
(B) deleting
(C) moving
(D) None

278) The load instruction is mostly used to designate a transfer from memory to a
processor register known as
(A) Program counter
(B) instruction register
(C) accumulator
(D) None
33 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

279) The most frequently used instructions of a computer program are likely to be
fetched from
(A) cache
(B) cookie
(C) main memory
(D) None

280) Arithmetic Logic Unit(ALU) and control sections have special purpose locations
called
(A) secondary memory
(B) registers
(C) accumulator
(D) None

281) speed of line printer is limited by the speed of


(A) cartridge used
(B) paper movements
(C) length of paper
(D) None

282) What are the units used to count the speed of a printer?
(A) DPI
(B) CPM
(C) PPM
(D) None

283) A parallel port is most often used by a


(A) monitor
(B) printer
(C) mouse
(D) None

284) External devices such as printers, keyboards & modems are known as…….
(A) add on devices
(B) extra hardware devices
(C) peripherals
(D) None

285) You can use the ‘Tab’ key……


(A) indent a paragraph
(B) move a cursor across the screen
(C) Both (A) & (B)
(D) None

286) In laser printers, printing is achieved by defecting laser beam on to……..


surface of a drum.
(A) magnetic
(B) magnetized
(C) photo sensitive
(D) None

287) The rate at which scanning is repeated in a CRT is called…..


(A) refresh rate
34 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

(B) resolution
(C) pitch
(D) None

288) Which is the best position for operating the mouse?


(A) Tail towards the user
(B) Tail facing the right
(C) Tail facing the left
(D) None

289) First computer mouse was built by


(A) Robert Zawacki
(B) William English
(C) Douglas Engelbart
(D) None

290) ……….. printer cannot print more than one character at a time
(A) Line
(B) Laser
(C) Dot Matrix
(D) None

291) The technique that extends storage capacities of main memory beyond the
actual size of the main memory is called
(A) switching
(B) virtual storage
(C) multitasking
(D) None

292) Which of the following memory chip is faster?


(A) DRAM
(B) RAM
(C) SRAM
(D) None

293) The term ………refers to data storage systems that make it possible for a
computer or electronic device to store and retrieve data
(A) storage technology
(B) input technology
(C) output technology
(D) None

294) Information stored in RAM need to be


(A) check
(B) modify
(C) refresh periodically
(D) None

295) The storage device used to compensate for the difference in rates of flow of
data from one device to another is termed as…..
(A) floppy
(B) chip
(C) buffer
(D) None
35 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

296) Floppy disks are organized as


(A) file
(B) tracks & sector
(C) header & footer
(D) None

297) ……. is the ability of ‘jump’ directly to the requested data


(A) sequential access
(B) random access
(C) quick access
(D) None

298) The ….. is the amount of data that a storage device can move from the storage
to the computer per second
(A) data transfer rate
(B) data access rate
(C) data migration rate
(D) None

299) Virtual memory is


(A) an extremely large main memory
(B) an illusion of extremely large main memory
(C) a type of memory
(D) None

300) ……… acts as a temporary high speed holding area between the memory and
the CPU thereby improving processing capabilities
(A) Cache
(B) RAM
(C) ROM
(D) None

Question Number Answers

1 D

2 B

3 A

4 D

5 D

6 B

7 D

8 C

9 D

10 A

36 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

11 A

12 A

13 A

14 B

15 D

16 A

17 A

18 D

19 C

20 D

21 C

22 C

23 D

24 C

25 A

26 C

27 C

28 D

29 A

30 B

31 D

32 D

33 C

34 C

35 C

36 A

37 D

38 C

39 A

40 B

41 C

42 A

43 A

37 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

44 B

45 B

46 B

47 A

48 D

49 B

50 A

51 D

52 B

53 C

54 A

55 C

56 B

57 B

58 C

59 C

60 B

61 B

62 A

63 D

64 B

65 D

66 C

67 D

68 B

69 C

70 A

71 C

72 C

73 A

74 C

75 A

76 A

38 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

77 C

78 B

79 A

80 C

81 B

82 A

83 C

84 B

85 B

86 B

87 C

88 C

89 A

90 D

91 A

92 A

93 A

94 A

95 A

96 B

97 B

98 B

99 A

100 C

101 C

102 A

103 A

104 A

105 C

106 D

107 A

108 B

109 A

39 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

110 A

111 B

112 B

113 B

114 B

115 C

116 B

117 B

118 A

119 B

120 A

121 A

122 B

123 B

124 B

125 B

126 B

127 C

128 B

129 C

130 C

131 C

132 C

133 B

134 A

135 C

136 C

137 C

138 B

139 B

140 A

141 B

142 B

40 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

143 B

144 B

145 B

146 A

147 A

148 B

149 B

150 B

151 B

152 C

153 A

154 B

155 B

156 B

157 C

158 B

159 A

160 C

161 A

162 B

163 A

164 A

165 A

166 C

167 C

168 A

169 A

170 C

171 C

172 A

173 B

174 C

175 B

41 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

176 A

177 C

178 B

179 C

180 A

181 A

182 C

183 A

184 B

185 A

186 A

187 B

188 C

189 A

190 B

191 A

192 A

193 B

194 C

195 B

196 C

197 B

198 C

199 C

200 A

201 C

202 A

203 B

204 D

205 C

206 D

207 A

208 B

42 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

209 C

210 D

211 A

212 B

213 C

214 C

215 B

216 C

217 B

218 C

219 B

220 A

221 B

222 B

223 A

224 B

225 A

226 B

227 B

228 A

229 C

230 A

231 C

232 C

233 A

234 B

235 B

236 A

237 B

238 A

239 A

240 B

241 A

43 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

242 B

243 C

244 B

245 A

246 B

247 A

248 D

249 C

250 A

251 B

252 A

253 D

254 A

255 A

256 D

257 A

258 A

259 C

260 C

261 C

262 A

263 B

264 A

265 B

266 B

267 A

268 B

269 C

270 A

271 A

272 B

273 B

274 C

44 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com
Q&A PDF

275 A

276 B

277 A

278 C

279 A

280 B

281 A

282 A

283 B

284 C

285 A

286 C

287 A

288 A

289 C

290 C

291 B

292 C

293 A

294 C

295 C

296 B

297 B

298 A

299 B

300 A

45 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage Copyright 2015 @ AffairsCloud.Com

Potrebbero piacerti anche