Home
Current Affairs January 2024

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about HYBRID topology in computer networks?

A. In the HYBRID topology all devices in a network are connected to a central device

B. The HYBRID topology is the combination of any two network topologies

C. In the HYBRID topology there is no need to required physical cable

D. None of the above

Correct Answer :

B. The HYBRID topology is the combination of any two network topologies


Related Questions

What is the correct answer?

4

How can we get a list of active ports in the Windows operating system?

A. Using netstate a command from the command line

B. Using netstat a command from the command line

C. Using getports -a command from the command line

D. None of the above

What is the correct answer?

4

There are following statements that are given below, which of them are correct about IMAP?
a) The IMAP is used to manipulate email messaging without downloading it on a local machine.
b) It is used to access multiple mailboxes concurrently.
c) IMAP enables users to search for emails.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which POP command is used to delete a message?

A. DELETE

B. DEL

C. DELE

D. REMOVE

What is the correct answer?

4

Which of the following command is used to generate SSH keys in the Linux operating system?

A. keygen-ssh

B. ssh-keygen

C. ssh-key

D. ssk-genkey

What is the correct answer?

4

There are the following statements that are given below, what are the advantages of RING topology in a computer network.

A. In the RING topology, if we add a new device then its impact is minimal on performance

B. In the RING topology, data can travel from alternative routes to reach the destination

C. Fault identification is easy

D. All of the above

What is the correct answer?

4

Which of the following are the parts of the URL?
a) Scheme
b) Host address
c) File path
d) None of the above
Options:

A. A and B

B. A and C

C. A, B, and C

D. D

What is the correct answer?

4

There are the following statements that are given below, which of them are the disadvantages of FTP protocol?
a) All FTP providers do not provide encrypted transfer of files.
b) It does not allow simultaneous transfers with multiple receivers.
c) We cannot send a very large file due to the size limit.
d) FTP is not supported in Linux operating system.
Options:

A. A and B

B. B and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

Which of the following are the components of the FTP Server?
a) Control process
b) Data transfer process
c) User Interface
d) None of the above
Options:

A. A and B

B. A and C

C. A, B, and C

D. D

What is the correct answer?

4

Which of the following are not correct types of network topologies in computer networks?

A. Star

B. Ring

C. Hybrid

D. None of the above

What is the correct answer?

4

There are the following options that are given below, which of them are part of the IEEE Ethernet frame header?
a) FCS field
b) Network addresses
c) Mac addresses
d) Network and Mac addresses
Options:

A. Only A

B. Only B

C. A and B

D. A and C

What is the correct answer?

4

Which of the following are correct GSM network elements?
a) Mobile Station
b) BSC
c) BTS
d) GPRS server nodes
Options:

A. A and B

B. B, C, and D

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

There are the following options that are given below, which of them are internetworking devices?

A. Router

B. Gateway

C. Both of the above

D. None of the above

What is the correct answer?

4

Which of the following are examples of terminal equipment GPRS class C?

A. Embedded modules used in vending machines

B. GPRS PCM/CIA cards

C. Both

D. None

What is the correct answer?

4

In which layer of OSI, Network Interface Card is used?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

Which of the following is not part of the format of the SSL certificate?

A. Signature algorithm

B. Public Key

C. Encrypted Text

D. Name of Issuer

What is the correct answer?

4

There are following options that are given below, where can we use full-duplex?
a) Switch to Switch
b) Host to Host
c) Hub to Hub
d) Switch to host
Options:

A. A, B and D

B. A and B only

C. A and D only

D. Only C

What is the correct answer?

4

There are the following options that are given below, which of them are correct parameters of HTTP?
a) HTTP version
b) URI
c) Space locator
d) Product tokens
Options:

A. A and B

B. C and D

C. A, B, and D

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below, which of them is correct about the DELETE method of the HTTP request?

A. DELETE method is used to dismiss the HTTP request.

B. The DELETE method is used to remove unwanted data from the HTTP request.

C. The DELETE method is used to remove all current representations of resources.

D. DELETE method is used to remove all encryption information from the HTTP request.

What is the correct answer?

4

MAC stands for?

A. Most Accessible Controller

B. Mobile Access Control

C. Mobile Access Communication

D. Media Access Control

What is the correct answer?

4

ISP stands for?

A. International Server Provider

B. International Service Provider

C. Internet Service Provider

D. Intranet Service Provider

What is the correct answer?

4

What is the full form of TNFS?

A. Trivial Network File System

B. Triple Network File System

C. Trusted Network File System

D. Temporary Network File System

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about OpenVPN protocol?
a) This protocol uses SSL/TLS based communication.
b) It is an open-source project, improved by hundreds of developers.
c) It is not an open-source protocol.
d) None of the above.
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below which of them are correct about WWW?
a) WWW provides Cross-Platform for websites.
b) It provides Hyper Text Information that can be accessed easily.
c) It provides Open Standards and Open Source.
d) It provides a single interface form different service.
Options:

A. C and D

B. A and B

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following standard defines the format of an SSL certificate?

A. X.506

B. X.507

C. X.508

D. X.509

What is the correct answer?

4

There are the following statements that are given below, which is the correct about internetworking?

A. Internetworking is the mechanism to connect multiple devices in a single network to share information only.

B. Internetworking is the mechanism to connect multiple devices in a single network to share resources only.

C. Internetworking is the mechanism to connect multiple networks to share data and resources.

D. None of the above

What is the correct answer?

4

What is the full form of W3C?

A. World Wide Web Council

B. World Wide Web Corporation

C. World Wide Web Consortium

D. World Wide Web Collaboration

What is the correct answer?

4

Which of the following are correct IEEE 802.11 network PHY standards?
a) 11a
b) 11b
c) 11p
d) 11y
Options:

A. A and B

B. A , B, and C

C. A, B, and D

D. A, B, C, and, D

What is the correct answer?

4

Which of the following is not the component of the SMTP protocol?

A. Mail Transfer Agent

B. User Agent

C. Server Agent

D. None of the above

What is the correct answer?

4

UMTS stands for?

A. Universal Mobile Telecommunication System

B. Ultimate Mobile Telecommunication System

C. Unique Mobile Telecommunication System

D. Useful Mobile Telecommunication System

What is the correct answer?

4

What is a socket in computer networks?

A. A socket is network topology to manage a network of devices

B. A socket is the combination of IP address and port

C. A socket is a network line configuration

D. None of the above