TERM 1 Final Super Super
TERM 1 Final Super Super
Que 2.Don't care conditions can be used for simplifying Boolean expressions in
Answer. K-maps
Que 3.Maxterm is the sum of_________of the corresponding Minterm with its literal
complemented.
Answer- Terms
Que 5.Which password protection method provides the most secure authentication?
Answer- MFA
Que 8. find the proper order, in times of access of the CPU(high speed to low speed)
Answer- Register->Cache memory->Ram
Que 9. Combination of Data Link and Physical layer of OSI forms which type of layer in TCP/IP
Model?
Answer- Host-to-Network
Que 10.Which of the below is related with level of security at MAC layer?
Answer- MAC address is easy spoof
Que 12. Number of logic gates and way of their interconnections can be classified as
Answer- Logical network
Que 13. Which of the following memory device are generally made semi conductor
Answer- SSD and RAM
Que 14. The topology in which all nodes are connected with each other is called?
Answer- Full Mesh
Que 15. Which layer of OSI model takes care of Formatting encryption and decryption of data?
Answer- Presentation layer
Que 16. Financial gain and criminal activity are the key motivations of which activity
Answer-
Que 17. Which device can work on both 2nd and 3rd layer of OSI model?
Answer- Switch
Que 18. In how many bands the radio frequencies are sub-divided into _______
Answer- 8
Que 19. What is the password encryption algorithm used for user authentication?
Answer- MD5
Que 20.
Answer-
Que 27. On addition of +38 and -20 using 2's complement, we get __________
Answer- 010010
Que 28. The output of AND gates in the SOP expression is connected using the_______gate
Answer- OR
Que 29. A media type that can be used for 500 meters and provide a bandwidth of 1000 mbps,
would have a technical specification as______
Answer- 1000 base SX
Que 30. Which of the following Application layer protocols sets up a secure session that's
similar to Teinet?
Answer- SSH
Que 34. A basic S-R flip-flop can be constructed by cross-coupling of which basic logic gates?
Answer- NOR or NAND gates
Que 35. Which layer is responsible for creating a segment and adding port number
Answer- Transport layer
Que 36.Which protocol is used to send a destination network unknown message back to
originating hosts?
Answer- ICMP
Que 37. Type of cable that has an inner conductor surrounded by a tubular Insulating layer &
tubular conducting shield
Answer- Coaxial
Que 39. Convert the binary equivalent 10101 to its decimal equivalent.
Answer- 21
[B] Selection
ง [D] Recruitment
A- A-B-D-C
52- is used when acknowledgement of data does not hold any significance.
A- UDP
53- Which one of the following may not necessarily be an advantage of coordination?
A- Co-ordination is not a separate function of manag
54- How to choose a secure password?
A- Try to use non-sense words
57- Which password protection method provides the most secure authentication?
A- MFA
Biometric
58- A Bluetooth discovery can take up to____seconds, after which the enquiring device should
know everyone within 10m.
A- 10.24 second
67- 63
68- cache memory acts between
A- CPU and RAM
69- external devices that are connected to a computer system are known as
A- Peripheral devices
70- which one is responsible for copying the machine code into computer memory
A- Loader
71- which electromagnetic spectrum is used for very short range communication purpose
A- ultraviolet rays
72- which protocol is used for streaming application such as VoIP streaming
A- UDP
78- The attempt to obtain sensitive information such as username, password and credit card
details, often for malicious reasons by masquerading as a trustworthy entity in an electronic
communication is:
A- Phishing Attack
81- which layer is responsible for flow control and error connection
A- transport layer
82- which of the following protocol work at application layer
A- TCP
TELNET
86- the topology in rich all nodes are connecting with each other is
A- full mesh
87- which type of writing is used in CAT5/CAT6 capable employed generally in Indoor LAN
A- Shielded Twisted Pair
Unshilded twisted pair
89- in a TFTP server where people can upload and download file in terms of OSI model what is
is the highest layer use during this TFTP sessions
A- Transport
92- You need to provide network connectivity to 150 client computers that will reside in the same
sub network, and each client computer must be allocated dedicated bandwidth. Which device
should you use to accomplish the task?
A- switch
Router
94- which all are the the compliments which are required for data communication
A-Protocol, sender, message,medium, receiver
96- the S-R latch composed of NAND gates is called an active low circuit because
A- it is only activated by a negative level triggered
98- which of the the management function is responsible for performance appraisal
A- HR
99 - during the execution of the instructions a copy of the instructions is placed in the
A- cache
101- what characteristics of Ram which is not suitable for permit storage
A-:It is volatile
102- number of password cracker reports the the technique for learning password
A- Use a Trojan horses
105- the output of AND gate in the SOP expression is connected using the ___ gate
A- OR
106 - For a decoder with inverted outputs, which gates can be used to generate the function?
A- NAND
112 - Government of India had decided to charge 25% of GST on the Refined Oil products.
Relate it with appropriate environment.
A-Macro Environment-Economic
115- which one of the figure shown below represent the exclusive - NOR gate
A-
120.)Banking and financial institutes are the part of which of the following?
Ans :- External Stakeholders
123.) Which of the following skills is equally important at all levels of management?
Ans:- Human relation skill
126.) Which one of the following is the external stakeholder for a business?
Ans :- Bank
127.) Which of the following is not the correct memory access method?
Ans:- Indirect
130.) Which of the following is lowest (Longest access time ) in memory hierarchy?
Ans:- Hard disk
133.) Which are the specific products needed to build ethernet LAN ?
Ans :- Transceivers and HUbs
134.) ____ is a type of promotion that relies on public relations effect of a news story carried
usually free by mass media.
Ans :- Advertisement
135.) Which printers uses the same Technology, that is used in photocopier?
Ans :- laser printer
138.) You need to provide network connectivity to 150 client computers that will reside in the
same sub network, and each client computer must be allocated dedicated bil Swidth. Which
device should you use to accomplish the task ?
A- MANAUL
141.)Which of the following malware appears to be harmless but can be very dangerous for
systems?
A :- Trojans
148.) The attempt to obtain sensitive information such as username password and credit card
details open for malicious reason by masquerading as a trustworthy entity is an electronic
communication is :-
A:- Phising Attack
150.) In how many bends the radio frequencies are subdivided into
A :- 8
156.) Which type of wiring is used in cat5/cat6 cable employed generally in Indoor lan
A :- shielded twisted pair and unshielded twisted pair
157.) Which is a physical threat?
A :- supply system threat
158.) Which electromagnetic spectrum travel in straight line and both sender and receiver must
be aligned to be strictly in line of sight?
A :- Microwaves
162.) The social network administrator issues the ping 192 .168 .2.5 command and successfully
test connectivity to a host that has been duly connected to the network which the call were used
during the test?
A :- ICMP and ARP
164.) Which electromagnetic spectrum is used for very short range communication purpose ?
A :- ultraviolet rays
169.) Which of the below is related with the level of security at Mac layer ?
Ans :- Mac address is easy to spoof
171.) What is the name of the nonvolatile chip that stores the data time and system
configuration?
Ans :- CMOS
174.) Service point addressing flow control and error control is taken care by which layer?
A :- Transport layer
177. Looking for the user credential information such as password of a person by looking for
his/her back without his/her
A- SHOULDER SURFING
191. A single person is completely responsible for the entire business with the business and
owner being not separate from each other
a- SOLE PROIPTERSHIPS
192.When the subordinates of the team are inexperienced and incompetent, which of the
leadership style would work well?
A- Autocratic Style Or Authorative
193.Among the options which of the following computer input device enable video conference?
A- WEBCAM
194.____is the process by which a manager coordinates human efforts, assembles resources
and integrates both to achieve the goals.
A- ORGANISING
195.If you use either Telnet or FTP, what Layer are you using to generate the data?
A- APPLICATION LAYER
196.Staffing is a ______function.
A- MANAGERIAL
203.Multiplexing is to transmit
A- MULTIPLE SIGNALS OVER SINGLE CHANNEL
205.Which device containing sensors send signals to computer whenever light changes are
detected?
A- LIGHT PEN
213- Which type of network is formed when 2 devices in different geographical area
communicates
A- WAN
215- which of the following waves are generally used for short distance communication in
remote controls and sensors?
A- microwave
217- Datalink layer takes care of error detection and correction in transmitted message by using
which mach
A- cyclic redundancy check