0% found this document useful (0 votes)
7 views

TERM 1 Final Super Super

Uploaded by

rahulsrsura
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

TERM 1 Final Super Super

Uploaded by

rahulsrsura
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Que 1. production method decision?

Answeer. Make to sell

Que 2.Don't care conditions can be used for simplifying Boolean expressions in
Answer. K-maps

Que 3.Maxterm is the sum of_________of the corresponding Minterm with its literal
complemented.
Answer- Terms

Que 4.Synchronization and Dialog Control is done on which OSI layer?


Answer- Session Layer

Que 5.Which password protection method provides the most secure authentication?
Answer- MFA

Que 6. computer networks,_______cables are mostly used.


Answer- CAT5e
CAT6

Que 7. What is the range for visible lights?


Answer- 10^-3 to 10^-7 meters

Que 8. find the proper order, in times of access of the CPU(high speed to low speed)
Answer- Register->Cache memory->Ram

Que 9. Combination of Data Link and Physical layer of OSI forms which type of layer in TCP/IP
Model?
Answer- Host-to-Network

Que 10.Which of the below is related with level of security at MAC layer?
Answer- MAC address is easy spoof

Que 11. how access time is calculated for a hard disk?


Answer- Access time = Seek time + Rotational latency

Que 12. Number of logic gates and way of their interconnections can be classified as
Answer- Logical network

Que 13. Which of the following memory device are generally made semi conductor
Answer- SSD and RAM

Que 14. The topology in which all nodes are connected with each other is called?
Answer- Full Mesh

Que 15. Which layer of OSI model takes care of Formatting encryption and decryption of data?
Answer- Presentation layer

Que 16. Financial gain and criminal activity are the key motivations of which activity
Answer-

Que 17. Which device can work on both 2nd and 3rd layer of OSI model?
Answer- Switch

Que 18. In how many bands the radio frequencies are sub-divided into _______
Answer- 8

Que 19. What is the password encryption algorithm used for user authentication?
Answer- MD5

Que 20.
Answer-

Que 21. Cable TV network is an example of:


Answer- MAN

Que 22. Which of the following is not a standard Ethernet Code?


Answer- FL and X

Que 23. What are the examples of physical security?


Answer- Fencing

Que 24. For a long distance communication we use


Answer- OFC

Que 25. In Boolean algebra, the bar sign (-) indicates_________________


Answer- NOT operation

Que 26.Specific, short-term measurable statements detailing how to achieve an organization's


goals is known as its_________
Answer- Objectives

Que 27. On addition of +38 and -20 using 2's complement, we get __________
Answer- 010010

Que 28. The output of AND gates in the SOP expression is connected using the_______gate
Answer- OR
Que 29. A media type that can be used for 500 meters and provide a bandwidth of 1000 mbps,
would have a technical specification as______
Answer- 1000 base SX

Que 30. Which of the following Application layer protocols sets up a secure session that's
similar to Teinet?
Answer- SSH

Que 31.What is the decimal equivalent of the binary number (10.1101)2


Answer- 2.8125

Que 32. EBCDIC follows encoding scheme of


Answer- 8 bit

Que 33. which topology is the best among all?


Answer- Star

Que 34. A basic S-R flip-flop can be constructed by cross-coupling of which basic logic gates?
Answer- NOR or NAND gates

Que 35. Which layer is responsible for creating a segment and adding port number
Answer- Transport layer

Que 36.Which protocol is used to send a destination network unknown message back to
originating hosts?
Answer- ICMP

Que 37. Type of cable that has an inner conductor surrounded by a tubular Insulating layer &
tubular conducting shield
Answer- Coaxial

Que 38. What information does a mac-address store?


Answer- OUI and Vendor ID

Que 39. Convert the binary equivalent 10101 to its decimal equivalent.
Answer- 21

40- What is the decimal equivalent of the hexadecimal number FC?


A- 252
41-

42- What is the default IP address for many wireless routers


192.168.1.1
43- If a 3-input NOR gate has eight input possibles how many of those possibilities well result it
in a high output
A- 1

44-Which of the following is not a level of Security in Wireless?


A- Single Sign On

45- To secure the data during communication it is


A- Encrypted

46-Select the "service from the below


A- Usage of Internet - Data Pack

47- What is not a production method decision?


A- Make to sell

48- is deciding in advance, what to do and how to do.


A- Planning

49-Vice-President [Human Resources] belong____ Management and would be taking___


decisions
A- Top Operational

50-provides the information on what parts are required to make a product.


A- Bill of material

51- Select the correct sequence of staffing process

[A] Estimate the Manpower requirement

[B] Selection

[C] Training & Development

ง [D] Recruitment

A- A-B-D-C

52- is used when acknowledgement of data does not hold any significance.
A- UDP

53- Which one of the following may not necessarily be an advantage of coordination?
A- Co-ordination is not a separate function of manag
54- How to choose a secure password?
A- Try to use non-sense words

55-What kind of production method is followed by a mobile phone manufacturer?


A - Make to Stoke

56- Data transfer speed through a system bus depends on.


A- All above

57- Which password protection method provides the most secure authentication?
A- MFA
Biometric

58- A Bluetooth discovery can take up to____seconds, after which the enquiring device should
know everyone within 10m.
A- 10.24 second

59-Which protocol is a good example for data flowing in one direction?


A- HTTP

60- pick the wrong type of bus


A- Program bus

61-which one of the following is the part of southbridge in a motherboard


A- BIOS

62- a microprocessor can understand only


A- machine language

63-which resistor can collects the result of computation


A- AC

64- which one of the following is not a part of microprocessor


A- register memory

65- how access time is calculated for a hard disk


A- access time= seek time+ relation latency

66- flow control of traffic is done on which layer of OSI model


A- transport layer

67- 63
68- cache memory acts between
A- CPU and RAM

69- external devices that are connected to a computer system are known as
A- Peripheral devices

70- which one is responsible for copying the machine code into computer memory
A- Loader

71- which electromagnetic spectrum is used for very short range communication purpose
A- ultraviolet rays

72- which protocol is used for streaming application such as VoIP streaming
A- UDP

73- ___ services authenticate the intruder logging on the system


A-

74- which of the below is not chopper medium


A- STP

75- which is not an example of SSO


A- teinet access

76- synchronization and dialog cantrol is done on which OSI layer


A- session layer

77- which type of cable is capable of carrying multiple beams


A- MMF

78- The attempt to obtain sensitive information such as username, password and credit card
details, often for malicious reasons by masquerading as a trustworthy entity in an electronic
communication is:
A- Phishing Attack

79- how the connections are established by TCP


A- SYNC -> SYNC + ACK -> ACK

80 - which topology is the best among


A- Star

81- which layer is responsible for flow control and error connection
A- transport layer
82- which of the following protocol work at application layer
A- TCP
TELNET

83- why infered transmission is more popular now a days


A- rapid development due to no licence required

84- IEEE standard for bluetooth communication is


A- 802.15

85- connection in which multi device share a single link is called


A- multipoint

86- the topology in rich all nodes are connecting with each other is
A- full mesh

87- which type of writing is used in CAT5/CAT6 capable employed generally in Indoor LAN
A- Shielded Twisted Pair
Unshilded twisted pair

88- which is the connection oriented protocol


A- TCP

89- in a TFTP server where people can upload and download file in terms of OSI model what is
is the highest layer use during this TFTP sessions
A- Transport

90- the concept of mutation engine is used by by which particular process


A- virus replication

91- based on the transmission technology network architecture is classified


A- client server architecture
Peer to peer

92- You need to provide network connectivity to 150 client computers that will reside in the same
sub network, and each client computer must be allocated dedicated bandwidth. Which device
should you use to accomplish the task?
A- switch
Router

93- which protocol does DHCP use at the transport layer


A- UDP

94- which all are the the compliments which are required for data communication
A-Protocol, sender, message,medium, receiver

95- which is/are not the rule of simplification k map


A- diagnoals allowed

96- the S-R latch composed of NAND gates is called an active low circuit because
A- it is only activated by a negative level triggered

97- in Star topology Central control is called


A- hub
Switch

98- which of the the management function is responsible for performance appraisal
A- HR

99 - during the execution of the instructions a copy of the instructions is placed in the
A- cache

100- where is a hub specified in the OSI model


A- physical layer

101- what characteristics of Ram which is not suitable for permit storage
A-:It is volatile

102- number of password cracker reports the the technique for learning password
A- Use a Trojan horses

103- which type of memory uses UV light to erase contents


A- EPROM

104- which one of the following is a sales forecasting method


A- qualitative method
Quantitative method

105- the output of AND gate in the SOP expression is connected using the ___ gate
A- OR

106 - For a decoder with inverted outputs, which gates can be used to generate the function?
A- NAND

107- What is the Standard used for Wi-Fi?


A- 802.11x

108- which of the following is connected with system bus?


A- main memory

109- Specific, short-term measurable statements detailing how to achieve an organization's


goals is known as its
A- Objective

110 - What is the 2's compliment representation of -1 as an 8-bit number?


A- 1111 1111

111 - How output of a sequential circuit is obtained?


A- Output = function(Current Stat

112 - Government of India had decided to charge 25% of GST on the Refined Oil products.
Relate it with appropriate environment.
A-Macro Environment-Economic

113- Which of the following is not the manufacturer of processors?


A- Qualcomm

114- which one of the following is part of micro environment


A- technological environment

115- which one of the figure shown below represent the exclusive - NOR gate
A-

116 - what gate does the following symbol refer to


NAND gate

118.)Which of the management function is responsible for performance appraisal?


A:- HR

Q119).Which of the following is Quantitative method of sale forecasting?

A:-The Delphi Technique

120.)Banking and financial institutes are the part of which of the following?
Ans :- External Stakeholders

121.) Which is/are not the rule of simplification in K-Maps?


Ans :- Diagonals allowed
117 and 122.) Which of the following memory devices are generally made of semiconductors?
Ans :- SSD and RAM

123.) Which of the following skills is equally important at all levels of management?
Ans:- Human relation skill

124.) Operation carried out by a NOT gate are also termed as


Ans :- inverting

125.) Which type of memory make use of capacitor to store data ?


Ans :- DRAM

126.) Which one of the following is the external stakeholder for a business?
Ans :- Bank

127.) Which of the following is not the correct memory access method?
Ans:- Indirect

128.) The input hexadecimal represtation of 1110 is


Ans :- E

129.) What is true about dynamic memory ?


Ans :- Consumes less space on a chip and less
And :- Needs refreshing circuitry

130.) Which of the following is lowest (Longest access time ) in memory hierarchy?
Ans:- Hard disk

131.) Which one of the type of memory is volatile ?


Ans :- RAM

132.) Which of the following is connected to data line of system bus?


Ans :- Memory data Register

133.) Which are the specific products needed to build ethernet LAN ?
Ans :- Transceivers and HUbs

134.) ____ is a type of promotion that relies on public relations effect of a news story carried
usually free by mass media.
Ans :- Advertisement

135.) which of the following is not a standard ethernet code ?


Ans :- FL and X

135.) Which printers uses the same Technology, that is used in photocopier?
Ans :- laser printer

136.) How many layers consist of in a TCP/IP model?


Ans :- 4

138.) You need to provide network connectivity to 150 client computers that will reside in the
same sub network, and each client computer must be allocated dedicated bil Swidth. Which
device should you use to accomplish the task ?

Ans :-Switch andRouter

139.) Wireless access point set up is in :-


Find :- ??
a.)GUI
b.)CLI ( it's correct)
c.)Auto
d.)Manaul

A- MANAUL

140.) Which of the following is an incorrect SOP expression ?


Ans :- (x + y) (x+z)

141.)Which of the following malware appears to be harmless but can be very dangerous for
systems?
A :- Trojans

142.) Which protocol is generally used for PING?


A :- ICMP

143.) Viruses has 2 parts :-


A :- a) Encrypted code
b) Decrypted code
144.) Programs that use your internet connection to send information from your personal
computer to some other computer normally without your knowledge or permission is
A :- spyware

145.) The function of password management


A :- Preservative and detective security control

146.) Which of the Following is not a type of social engineering ?


A :- shoulder surfing

147.) In computer networks , _______ cables are mostly used ?


Ans a.) CAT 5e
b.) CAT6

148.) The attempt to obtain sensitive information such as username password and credit card
details open for malicious reason by masquerading as a trustworthy entity is an electronic
communication is :-
A:- Phising Attack

149.) Based on the transmission technology network architecture is classified into


A :- client server architecture
Peer to peer

150.) In how many bends the radio frequencies are subdivided into
A :- 8

151.) To secure password over internet we use


A:- hashing

152.) Router works on which layer of OSI model


Ans :- network

153.) Address bus is _____ and Data bus is ______


Ans :- Uni directional and bi directional
154.) Which layer of OSI model is similar to internet layer of TCP/IP suite
Ans :-network

155.) Marketing mix includes


A:- product price promotion and place

156.) Which type of wiring is used in cat5/cat6 cable employed generally in Indoor lan
A :- shielded twisted pair and unshielded twisted pair
157.) Which is a physical threat?
A :- supply system threat

158.) Which electromagnetic spectrum travel in straight line and both sender and receiver must
be aligned to be strictly in line of sight?
A :- Microwaves

159.) Select the proper objective of a business?


A :-getting maximum result from minimum effort

160.)Boolean algebra is collection of objects having


A:- common properties

161.) Which of the below is not copper medium?


A:- SMF

162.) The social network administrator issues the ping 192 .168 .2.5 command and successfully
test connectivity to a host that has been duly connected to the network which the call were used
during the test?
A :- ICMP and ARP

163.) Which of the below application does not uses UDP ?


A :- HTTPS

164.) Which electromagnetic spectrum is used for very short range communication purpose ?
A :- ultraviolet rays

165.) Cable with 568-B configuration on both ends is


A :-straight through cables

166.) Pick the odd one out


A :- Program Bus

167.) Same 156

168.) Which is the password cracking utility


A :-brute force method

169.) Which of the below is related with the level of security at Mac layer ?
Ans :- Mac address is easy to spoof

170.) What is the IEEE standard for the fast Ethernet?


Ans :- IEEE802.3u

171.) What is the name of the nonvolatile chip that stores the data time and system
configuration?
Ans :- CMOS

172.) Which of the below application does not use UDP ?


Ans :- DNS and HTTPS

173.) _______ Service authenticate the intruder login on the system.


A :- password and TIN

174.) Service point addressing flow control and error control is taken care by which layer?
A :- Transport layer

175.In which layer of data travel in form of packet?


A- NETWORK

176.Which type of cable we can use F-type connector?


A –COAXIAL CABLE

177. Looking for the user credential information such as password of a person by looking for
his/her back without his/her
A- SHOULDER SURFING

178.Which type of device hub is?


A- 1- Passive
ACTIVE AND PASSIVE

179.Topology in which devices uses hub and spoke connection


A- STAR TOPOLOGY

180.Which protocol is used at network Access layer of TCP/IP model?


A- ETHERNET

181.Which system software convert the assembly language to machine language?


A-ASSEMBLER

182.The ALU use of ___to store the intermediate result.


A- ACCUMULATOR

183.Which is the one way mode of communication?


A- SIMPLEX
184.Single sign-on helps in
A- REDUCING THE NUMBER OF TIME A USER HAS TO ENTER PASSWORD

185.Which type of device Switch is?


A- LAYER 2

186.the abbreviation for SNMP is:


A- SIMPLE NETWORK MANAGEMENT PROTOCOL

187.Which of the following is the correct sequence of instruction cyce?


A- Start- Fetch next - execute - halt

188.While delegating a superior delegates has____


A- ONLY AUTHORITY

189.Which channel would give you 100 mbps link?


A- 100BASE-TX

190.____are malicious program that changes it…


A- METAMORPHIC VIRUSES

191. A single person is completely responsible for the entire business with the business and
owner being not separate from each other
a- SOLE PROIPTERSHIPS

192.When the subordinates of the team are inexperienced and incompetent, which of the
leadership style would work well?
A- Autocratic Style Or Authorative

193.Among the options which of the following computer input device enable video conference?
A- WEBCAM

194.____is the process by which a manager coordinates human efforts, assembles resources
and integrates both to achieve the goals.
A- ORGANISING

195.If you use either Telnet or FTP, what Layer are you using to generate the data?
A- APPLICATION LAYER

196.Staffing is a ______function.
A- MANAGERIAL

197.The 'T' in the flip flop stands for


A- TOGGLE

198.IEEE standard for WIMAX is


A- 802.16

199.Mac Address is component of:


A- NIC

200. Logic gates have values in


A- BINARY NUMBERS

201.Each terms in the standard POS form is called a


A- MAXTERN

202.Which network device used to regenerate or replicate a signal?


A- REPEATER

203.Multiplexing is to transmit
A- MULTIPLE SIGNALS OVER SINGLE CHANNEL

204.Which of the following is a function of a computer?


A- ALL OF THE ABOVE

205.Which device containing sensors send signals to computer whenever light changes are
detected?
A- LIGHT PEN

206.IP address works on which layer of OSI model?


A- NETWORK LAYER

207. Which of the following is not true in respect of Planning ?


A – Planning function is not performed by the Management

208. Planning function is Mainly performed at


A- ALL MANAGEMENT LEVEL

209. Maximum distance of 100BASE-FX is


A- 2000m

210- Which of the following Ports/Connectors have 9 pins?


A- serial

211-During the execution of a program which gets initialized first?


A- PC
212- Over a copper medium which type of signals are generated?
A- electral

213- Which type of network is formed when 2 devices in different geographical area
communicates
A- WAN

214-which is true about SRAM?


A- no referencing circuit is needed

215- which of the following waves are generally used for short distance communication in
remote controls and sensors?
A- microwave

216- ches/Flip-flops are internally made of


A- logic gates

217- Datalink layer takes care of error detection and correction in transmitted message by using
which mach
A- cyclic redundancy check

218- which one of the following not a system bus


A- Timer bus

You might also like