Q1. Which of the following are type of Twisted Pair Cable?
(a) Coaxial Cable
(b) Shielded Twisted Pair (STP)
(c) Unshielded Twisted Pair (UTP)
(d) Only (b) and (c)
(e) All of the above
Q2. Star Topology is based on a central device that can be a:
(a) HUB
(b) Switch
(c) Modem
(d) Both (a) and (b)
(e) Repeater
Q3. Routing is done on which layer?
(a) Datalink Layer
(b) Network Layer
(c) Session
(d) Presentation
(e) Application
Q4. Which among the following device performs modulation and demodulation?
(a) Modem
(b) Fiber optic
(c) Satellite
(d) Coaxial Cable
(e) Repeater
Q5. What is an ad hoc query?
(a) Pre-planned question
(b) Pre-scheduled question
(c) Spur-of-the-moment question
(d) Question that will not return any results
(e) None of these
Q6. Name the program a personal computer’s microprocessor uses to get the computer system started after you turn it on.
(a) BIOS
(b) VAIO
(c) I/O
(d) AVG
(e) VMware
Q7. A _________ is used to direct and dispatch data packets between different networks.
(a) Connection
(b) Bridge
(c) Gateway
(d) Hub
(e) Router
Q8. Dr. E.F. Codd represented ______ rules that a database must obey if it has to be considered truly relational.
(a) 10
(b) 8
(c) 12
(d) 6
(e) 5
Q9. Which of the following is true about Page Preview Mode?
(a) You can see all pages of your document
(b) You can only see the page you are currently working
(c) You can only see pages that do not contain graphics
(d) You can only see the title page of your document
(e) None of the above
Q10. What is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication?
(a) Phishing
(b) Keylogging
(c) Identity theft
(d) Authentication
(e) Spamming
Q11. OSI model has how many layers?
(a) Two layers
(b) Five Layers
(c) Seven Layers
(d) Six Layers
(e) Eight Layers
Q12. Network __________ is the arrangement of the various elements (links, nodes, etc.) of a computer network.
(a) memory
(b) topology
(c) mainframe
(d) protocol
(e) devices
Q13. Which of the following terms is associated with Internet?
(a) Plotter
(b) Slide presentation
(c) Bookmark
(d) Pie Chart
(e) Microsoft Excel
Q14. Which of the following is contained at the end of the file name and helps to determine the type of file?
(a) File property
(b) The nomenclature
(c) The name
(d) File subname
(e) File extension
Q15. How can you access the font size tool on font dialog box in MS Word?
(a) Ctrl + S
(b) Ctrl + Shift + S
(c) Ctrl + P
(d) Ctrl + Shift + P
(e) Alt + P