Data communication and networking Practice Question and Answer
8 Q: How many Pins are there in VGA Cable?
858 064942bfd13e8bde03235b582
64942bfd13e8bde03235b582- 111false
- 212false
- 317false
- 4None of thesetrue
- Show Answer
- Workspace
- SingleChoice
Answer : 4. "None of these"
Explanation :
1. There are two types of VGA cables: 14-pin and 15-pin. 14-pin cables will work in most applications, but wider display compatibility may require a 15-pin cable.
Q: Which statement is true for Router and Wretch?
616 063edfee03c221e1b4dd138d6
63edfee03c221e1b4dd138d6- 1Wretch connects two networks at data link layerfalse
- 2Router is more usefulfalse
- 3Router connects two networks at the Network Layer.false
- 4both (a) and (c)true
- Show Answer
- Workspace
- SingleChoice
Answer : 4. "both (a) and (c)"
Q: Which cobble is used to send modulated light?
980 063ee06080fa4111f87e466e4
63ee06080fa4111f87e466e4- 1Category 3 UTPfalse
- 2Category 5 UTPfalse
- 3fibertrue
- 4coaxfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 3. "fiber"
Explanation :
It seems there might be a confusion in your question. If you are referring to the technology used for transmitting data using modulated light, the term you are looking for is "fiber optic cable" or simply "fiber." Fiber optic cables are thin, flexible strands of glass or plastic that transmit data as modulated light pulses. They are widely used for high-speed data transmission over long distances due to their ability to carry large amounts of data with low attenuation and high bandwidth capabilities.
Q: Junk e-mail is called:
650 064a540acb394764d11b18bdf
64a540acb394764d11b18bdf- 1Spamtrue
- 2Spooffalse
- 3Sniffer scriptfalse
- 4Spoolfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 1. "Spam"
Explanation :
1. Junk email is called spam. Spam is an email that you did not request, and which usually promotes advertising or other unwanted content.
2. Spoofing is a special type of cyber-attack in which someone attempts to deceive other computer networks by using a computer, device, or network to identify themselves as a legitimate entity.
Q: In terms of Computer Networks, what does VPN stands for:
1193 063ac17eb5770eb565d5d95b9
63ac17eb5770eb565d5d95b9- 1vertical personal networkfalse
- 2Verbal Private Newsfalse
- 3virtual private newsfalse
- 4virtual Private Networktrue
- Show Answer
- Workspace
- SingleChoice
Answer : 4. "virtual Private Network "
Explanation :
A Virtual Private Network (VPN) is a technology that allows users to create a secure and encrypted connection to another network over the internet. VPNs are commonly used to ensure privacy and security when browsing the internet, especially when using public Wi-Fi networks. VPNs create a private tunnel for data transmission, protecting users' online activities from surveillance, censorship, and potential cyber threats.
Q: Which subnet is used for LAN security to bring stability in the Internet network?
723 063e62d813c221e1b4dbd9282
63e62d813c221e1b4dbd9282- 1static routertrue
- 2dynamic routerfalse
- 3static switchfalse
- 4dynamic switchfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 1. "static router"
Q: Which components are used in LAN for Ethernet?
920 063edff5de6cd351b7500c59c
63edff5de6cd351b7500c59c- 1COAXfalse
- 2Fiberfalse
- 3STPfalse
- 4All of the abovetrue
- Show Answer
- Workspace
- SingleChoice
Answer : 4. "All of the above"
Explanation :
All three components—COAX (coaxial cables), Fiber (optical fiber cables), and STP (shielded twisted pair cables)—can be used in LANs for Ethernet connectivity, depending on specific network requirements and conditions. Different types of Ethernet cables, including coaxial, fiber optic, and shielded twisted pair, are used based on factors such as data transfer speed, distance, and susceptibility to electromagnetic interference.
Q: Search engines perform the following tasks?
825 064b9139ee154aff53380df03
64b9139ee154aff53380df03- 1Web crawlingfalse
- 2Indexingfalse
- 3Searchingfalse
- 4All of the abovetrue
- Show Answer
- Workspace
- SingleChoice
Answer : 4. "All of the above "
Explanation :
The search engine performs the following tasks-
1. Web crawling: Search engines search all web pages on the web using a crawler. A crawler is a program that finds new web pages by following links on the web.
2. Indexing: Once the crawler finds all the web pages, the search engine indexes them in a database. The index contains information for each web page, such as title, URL, and content.
3. Searching: When a user types a search query, the search engine searches all the web pages in the index that may be related to the query.