1 |
Logical security for on-line systems is achieved primarily by ________ and authorization codes |
MIS
Passwords
Tactical
None of the above
|
2 |
What does the acronym ISDN stand for? |
International Services Data Network
Intelligent Services Digital Network
Integrated Services Digital Network
Interactive Services Digital Network
|
3 |
Who invented the modem? |
IBM
DEC
AT&T information System, USA
Apple computers Inc
|
4 |
A driver is. |
hardware
a peripheral device
a card
software
|
5 |
Now-a-day computers all over the world can talk to each other. Which is one of the special accessories essential for this purpose? |
Fax card
Modem card
Network Adapter card
DVD
|
6 |
Cabling on a linear bus topology can be extended using which of the following? |
Terminator
Barrel connector
Network adapter card
Medium attachment unit
|
7 |
What best describes a bus topology network? |
The number of computers on the network does not affect performance
Easier to troubleshoot than other topologies
Needs significantly more cabling than other topologies
Media is inexpensive and easy to work with
|
8 |
Which of the following topologies is passive? |
Star topology
Ring topology
Bus topology
Hybrid topology
|
9 |
Which of the following statements best describes a star topology? |
Needs significantly less cabling than other topologies
Breaks in a single cable segment takes down entire network
More difficult to reconfigure than other topologies
Centralized monitoring and management
|
10 |
Which of the following does not provide a graphical user interface. |
OS/2
MS-DOS
Macintosh
Windows NT Workstation
|
11 |
A device that connects multiple nodes to the network is. |
A modem
A repeater
A router
A hub
|
12 |
Which of the following is not a category of network problems. |
Newsgroup problems
Physical problems
Electrical problems
Viruses
|
13 |
The media Access Control sublayer resides in which OSI layer? |
Physical
Data Link
Network
Transport
|
14 |
What enables a computer to work with a printer? |
Protocols
Drivers
Packet processor
HCL
|
15 |
Token passing prevents data collisions by. |
Using code to steer tokens around each other
Having multiple tokens take alternate routes.
Allowing only one computer at a time to use the token
Using zones to control network traffic congestion
|
16 |
Which of the following access methods listens to the cable for network traffic before sending data? |
Token passing
Polliing
CSMA/CA
CSMA/CD
|
17 |
What layer of the OSI model does data compression? |
Network
Data Link
Presentation
Physical
|
18 |
Project 802 defines standards for which layers of the OSI model? |
Application and Presentation layers
Physical an Date Link layers
Transport and Network layers
Network and Data Link layers
|
19 |
A network of geographically distant computers and terminals is called a. |
bus
WAN
gateway
LAN
|
20 |
People on a LAN can share. |
Printer
CD/ROM disk drive
modem
fax machine
All of the above
|
21 |
The transfer if encoded information from one location to another by a communication channel is called |
data processing
data distribution
data communication
data encryption
|
22 |
Pick up wrong logical expression |
|
23 |
According to Boolean algebra x + 1 = ______________ |
0
1
x
|
24 |
|
0
1
x
|
25 |
|
0
1
x
|
26 |
According to Idempotent law , x + y = __________ |
1
0
x
x . x
|
27 |
In a three input NAND gate, if all the inputs are 1, the output is. |
0
1
3
indeterminate
|
28 |
The number of inputs to full adder are |
1
2
3
4
|
29 |
The half adder circuit has |
one input
two inputs
three inputs
always more than two inputs
|
30 |
The heart of analog to digital converter (ADC) is |
comparator
pulse generator
voltage source
current source
|