Data communication and networking Practice Question and Answer

Q:

How many Pins are there in VGA Cable?

858 0

  • 1
    11
    Correct
    Wrong
  • 2
    12
    Correct
    Wrong
  • 3
    17
    Correct
    Wrong
  • 4
    None of these
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 4. "None of these"
Explanation :

1. There are two types of VGA cables: 14-pin and 15-pin. 14-pin cables will work in most applications, but wider display compatibility may require a 15-pin cable.

Q:

Which statement is true for Router and Wretch?

616 0

  • 1
    Wretch connects two networks at data link layer
    Correct
    Wrong
  • 2
    Router is more useful
    Correct
    Wrong
  • 3
    Router connects two networks at the Network Layer.
    Correct
    Wrong
  • 4
    both (a) and (c)
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 4. "both (a) and (c)"

Q:

Which cobble is used to send modulated light?

980 0

  • 1
    Category 3 UTP
    Correct
    Wrong
  • 2
    Category 5 UTP
    Correct
    Wrong
  • 3
    fiber
    Correct
    Wrong
  • 4
    coax
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 3. "fiber"
Explanation :

It seems there might be a confusion in your question. If you are referring to the technology used for transmitting data using modulated light, the term you are looking for is "fiber optic cable" or simply "fiber." Fiber optic cables are thin, flexible strands of glass or plastic that transmit data as modulated light pulses. They are widely used for high-speed data transmission over long distances due to their ability to carry large amounts of data with low attenuation and high bandwidth capabilities.

Q:

Junk e-mail is called:

650 0

  • 1
    Spam
    Correct
    Wrong
  • 2
    Spoof
    Correct
    Wrong
  • 3
    Sniffer script
    Correct
    Wrong
  • 4
    Spool
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 1. "Spam"
Explanation :

1. Junk email is called spam. Spam is an email that you did not request, and which usually promotes advertising or other unwanted content.

2. Spoofing is a special type of cyber-attack in which someone attempts to deceive other computer networks by using a computer, device, or network to identify themselves as a legitimate entity.

Q:

In terms of Computer Networks, what does VPN stands for: 

1193 0

  • 1
    vertical personal network
    Correct
    Wrong
  • 2
    Verbal Private News
    Correct
    Wrong
  • 3
    virtual private news
    Correct
    Wrong
  • 4
    virtual Private Network
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 4. "virtual Private Network "
Explanation :

 A Virtual Private Network (VPN) is a technology that allows users to create a secure and encrypted connection to another network over the internet. VPNs are commonly used to ensure privacy and security when browsing the internet, especially when using public Wi-Fi networks. VPNs create a private tunnel for data transmission, protecting users' online activities from surveillance, censorship, and potential cyber threats.

Q:

Which subnet is used for LAN security to bring stability in the Internet network?

723 0

  • 1
    static router
    Correct
    Wrong
  • 2
    dynamic router
    Correct
    Wrong
  • 3
    static switch
    Correct
    Wrong
  • 4
    dynamic switch
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 1. "static router"

Q:

Which components are used in LAN for Ethernet?

920 0

  • 1
    COAX
    Correct
    Wrong
  • 2
    Fiber
    Correct
    Wrong
  • 3
    STP
    Correct
    Wrong
  • 4
    All of the above
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 4. "All of the above"
Explanation :

All three components—COAX (coaxial cables), Fiber (optical fiber cables), and STP (shielded twisted pair cables)—can be used in LANs for Ethernet connectivity, depending on specific network requirements and conditions. Different types of Ethernet cables, including coaxial, fiber optic, and shielded twisted pair, are used based on factors such as data transfer speed, distance, and susceptibility to electromagnetic interference.


Q:

Search engines perform the following tasks?

825 0

  • 1
    Web crawling
    Correct
    Wrong
  • 2
    Indexing
    Correct
    Wrong
  • 3
    Searching
    Correct
    Wrong
  • 4
    All of the above
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 4. "All of the above "
Explanation :

The search engine performs the following tasks-

1. Web crawling: Search engines search all web pages on the web using a crawler. A crawler is a program that finds new web pages by following links on the web.

2. Indexing: Once the crawler finds all the web pages, the search engine indexes them in a database. The index contains information for each web page, such as title, URL, and content.

3. Searching: When a user types a search query, the search engine searches all the web pages in the index that may be related to the query.

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully