Home
Current Affairs January 2024

What is the correct answer?

4

In which year WiFi was introduced?

A. 1998

B. 2000

C. 2001

D. 2002

Correct Answer :

A. 1998


Related Questions

What is the correct answer?

4

Which default port is used for Jenkins?

A. 8080

B. 8090

C. 9082

D. None of the above

What is the correct answer?

4

Which of the following command is used for telnet in the Linux operating system?

A. tl

B. telnet

C. tn

D. tnet

What is the correct answer?

4

There are following statements that are given below, which of them are correct about IMAP?
a) The IMAP is used to manipulate email messaging without downloading it on a local machine.
b) It is used to access multiple mailboxes concurrently.
c) IMAP enables users to search for emails.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which default port is used for MongoDB?

A. 25017

B. 27017

C. 26017

D. 11111

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about SSH protocol?
a) It is a remote login protocol, which is used to remotely log in using the command line.
b) SSH stands for Secure Shell.
c) Port 22 is used for SSH by default.
d) To use SSH protocol we required SSH server and SSH client programs.
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

What is the full form of GSM?

A. Global System for Mobile

B. Global Service for Mobile

C. General Service for Mobile

D. General System for Mobile

What is the correct answer?

4

There are the following options that are given below, which of them are correct parameters of the UDP header?
a) Source Port number
b) Destination Port Number
c) Checksum
d) Flow control Flags
Options:

A. A and B

B. A, B, and C

C. A, C, and D

D. A, B, C, and D

What is the correct answer?

4

On which layer switch and bridge are operated?

A. Session Layer

B. Network Layer

C. Presentation Layer

D. Data Link Layer

What is the correct answer?

4

What is the full form of ETSI?

A. European Telegraph Standard Institute

B. European Telecommunications Standard Institute

C. Eastern Telephonic Standard Institute

D. European Telephonic Standard Institute

What is the correct answer?

4

There are the following options that are given below, which is the correct example of a half-duplex system?

A. Telephone

B. Walkie-Talkie

C. Radio

D. Television

What is the correct answer?

4

How can we get a list of active ports in the Windows operating system?

A. Using netstate a command from the command line

B. Using netstat a command from the command line

C. Using getports -a command from the command line

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about STAR network topologies in computer networks?

A. In the STAR topology all devices in a network are connected to a central device

B. In the STAR topology all devices in a network are connected to each other

C. In the STAR topology there is no need to required physical cable

D. None of the above

What is the correct answer?

4

Which layer of the OSI model is responsible for transmission mode?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

UDP operates on which layer of the OSI model?

A. Network layer

B. Transport layer

C. Presentation layer

D. Application layer

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about radio signals in WiFi communication?

A. Radio signals are transmitted by WiFi Antenna and received by WiFi receivers within the range of WiFI.

B. WiFi cards are used to read the WiFi signal and create connectivity between user and network.

C. Both of the above

D. None of the above

What is the correct answer?

4

There are the following options that are given below, which of them are correct about URL encoding in HTTP?

A. URL encoding is used to replace some unsafe characters with specific characters in the URL.

B. URL encoding is used to encrypt data send in URL

C. URL encoding is used to encrypt complete URL

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about FTP?
a) FTP stands for File Transmission Protocol.
b) FTP is used to transfer files between clients and servers in the network.
c) FTP is a transport layer protocol.
d) FTP works with the command line as well as a graphical user interface.
Options:

A. A and B

B. B and C

C. B and D

D. A, B, and D

What is the correct answer?

4

PTP stands for?

A. Post Time Protocol

B. Post Transfer Protocol

C. Picture Transfer Protocol

D. Pixel Transfer Protocol

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about WebNFS?
a) The WebNFS is the extension of the NFS to access the file system over the internet.
b) This allows easy integration of NFS with a web browser.
c) This allows operations through the firewall.
d) All the above
Options:

A. A and B

B. A, and C

C. A, B, and C

D. D

What is the correct answer?

4

How can we send some data or information to the particular webpage using URL?

A. Using Select Query

B. Using Query String

C. Using some special ports

D. Using the FTP protocol

What is the correct answer?

4

The OSI model was developed by?

A. Advanced Research Project Agency

B. International Organization of Standardization

C. Internet Service Provider

D. Bell Laboratory

What is the correct answer?

4

DHCP stands for?

A. Double Host Committed Protocol

B. Dynamic Host Common Protocol

C. Dynamic Hyper Common Protocol

D. Dynamic Host Configuration Protocol

What is the correct answer?

4

Which of the following configuration file is used to control on which port RPC and other services are listening in the Redhat Linux operating system?

A. /etc/sysconfig/nfs/

B. /etc/fstab/

C. /etc/exports

D. None of the above

What is the correct answer?

4

What is ARP spoofing?

A. ARP proxy request

B. RARP request

C. Inverse ARP request

D. Type of network attack

What is the correct answer?

4

What is the correct range of specific well-known ports, like 80 for HTTP in computer networks?

A. 0 1023

B. 1024 49151

C. 49152 65535

D. All the above

What is the correct answer?

4

A host address in a URL can be?

A. An IP address

B. A Domain Name

C. Both

D. None

What is the correct answer?

4

There are the following statements that are given below, which of them are correct Inverse ARP?
a) The Inverse ARP protocol is used to get the IP address from the MAC address.
b) It is the opposite of ARP.
c) The Inverse is used in only the Linux operating system.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

What is the full form of CSMA/CA?

A. Carrier Sense Media Access with Collision Avoidance

B. Carrier Sense Multiple Access with Collision Avoidance

C. Carrier Sense Minimum Access with Collision Avoidance

D. Carrier Sense Maximum Access with Collision Avoidance

What is the correct answer?

4

Which google service is used for URL shortening?

A. goo.gl

B. goole.gl

C. go.gl

D. go.short

What is the correct answer?

4

What is the default port for HTTP?

A. 80

B. 443

C. 15001

D. None of the above