Home
Current Affairs January 2024

What is the correct answer?

4

What is the command is used to get an IP address from a URL in the windows operating system?

A. netstate

B. getipaddress

C. nslookup

D. nsipaddress

Correct Answer :

C. nslookup


Related Questions

What is the correct answer?

4

In which VTP mode, we can change VLAN information on the switch?

A. Server

B. Client

C. ISL

D. STP

What is the correct answer?

4

Which of the following are not correct types of network topologies in computer networks?

A. Star

B. Ring

C. Hybrid

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about HYBRID topology in computer networks?

A. In the HYBRID topology all devices in a network are connected to a central device

B. The HYBRID topology is the combination of any two network topologies

C. In the HYBRID topology there is no need to required physical cable

D. None of the above

What is the correct answer?

4

There are the following statements that are given below which of them are correct about SPARQL?
a) It is a semantic query language that is used to perform database operations.
b) It manipulates data stored in RDF format.
c) It does not support the SELECT statement.
d) All the above
Options:

A. B and C

B. A and B

C. A and C

D. D

What is the correct answer?

4

Which default port is used for MS SQL Server?

A. 3506

B. 4406

C. 1306

D. 1433

What is the correct answer?

4

What is the full form of CBC?

A. Cyclic Base Channing

B. Cipher Block Channing

C. Cipher Base Channing

D. Cyclic Block Channing

What is the correct answer?

4

There are the following statements that are given below, which of them are correct statements about GPRS?
a) GPRS provides consistent IP services.
b) It provides wireless internet accesses over mobile phones.
c) GPRS uses the same infrastructure for different air interfaces.
d) GPRS is older technology; it does not use in the current scenario.
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

In which year OSI model was developed?

A. 1999

B. 1984

C. 1970

D. 2000

What is the correct answer?

4

Which of the following RFC number is related to URL?

A. RFC 1735

B. RFC 1738

C. RFC 2020

D. RFC 2021

What is the correct answer?

4

Which of the following configuration file is used for SSH in the Linux operating system?

A. /etc/config/ssh.conf

B. /etc/ssh/sshd_config

C. /etc/ssh.config

D. /etc/sshfs.conf

What is the correct answer?

4

What is the correct range of specific well-known ports, like 80 for HTTP in computer networks?

A. 0 1023

B. 1024 49151

C. 49152 65535

D. All the above

What is the correct answer?

4

NetBIOS stands for?

A. Network Basic Input Output Server

B. Network Basic Input Output System

C. Network Basic Input Output Service

D. Next Basic Input Output Server

What is the correct answer?

4

Which of the following NFS command is used to lists the available shares at the remote server?

A. showmount e

B. showmount d

C. exportfs u

D. exportfs v

What is the correct answer?

4

Which of the following protocol(s) is/are used by IEEE 802.11 standards?

A. CSMA/CA

B. CSMA/CD

C. Both

D. None

What is the correct answer?

4

Which of the following number is assigned for IPv4 in the protocol type field of ARP message format?

A. 0x400

B. 0x800

C. 0x100

D. 0x200

What is the correct answer?

4

Which of the following are application layer protocols?

A. TCP

B. UDP

C. Both of the above

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, what are the disadvantages of BUS topology in a computer network.
a) If the main cable is damaged then the complete network will not work.
b) Network disturbance occurs when we add or remove a device into a network.
c) Performance gets decreased when a new node is added to the network.
d) There is a security issue because every node in the network can access the data for other nodes.
Options:

A. A and B

B. B and C

C. C and D

D. A, B, C, and, D

What is the correct answer?

4

Which of the following companies have its URL shortening services?
a) GoDaddy
b) Twitter
c) Google
d) All of the above
Options:

A. A and B

B. B and C

C. A and C

D. D

What is the correct answer?

4

Which of the following configuration file is used to control on which port RPC and other services are listening in the Redhat Linux operating system?

A. /etc/sysconfig/nfs/

B. /etc/fstab/

C. /etc/exports

D. None of the above

What is the correct answer?

4

What are the correct sub-layers of the data link layer?

A. Media Access Control

B. Logical Link Layer

C. Both of the above

D. None of the above

What is the correct answer?

4

HTTPS stands for?

A. Hyper Text Transfer Protocol Secure

B. Hyper Text Transfer Protocol Saturn

C. Hyper Time Transfer Protocol Saturn

D. Hyper Time Transfer Protocol Secure

What is the correct answer?

4

How many bits are used for checksum in UDP header?

A. 4 bytes

B. 8 bytes

C. 16 bytes

D. 32 bytes

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about TLS?
a) TLS stands for Transport Layer Security.
b) TLS is a security protocol that is used to implement secured communication between a web browser and a web server.
c) TLS is also used to implement secured communication for emails, messaging, etc.
d) SSL is the advanced version of TLS.
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

VHF stands for?

A. Very High Frequency

B. Visual High Frequency

C. Virtual High Frequency

D. Virtual Host Frequency

What is the correct answer?

4

Which of the following are the parts of the URL?
a) Scheme
b) Host address
c) File path
d) None of the above
Options:

A. A and B

B. A and C

C. A, B, and C

D. D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about UDP?
a) UDP is used for multimedia streaming.
b) It is a good protocol for flowing data in one direction.
c) This protocol is suitable for query-based applications
d) None of the above
Options:

A. B and C

B. A and B

C. A, B, and C

D. D

What is the correct answer?

4

What is the full form of VTP?

A. VLAN Tagged Protocol

B. Visual Trunking Protocol

C. VLAN Trunking Protocol

D. Virtual Tagged Protocol

What is the correct answer?

4

What is the full form of UMTS?

A. Universal Mobile Telecommunication System

B. Unique Mobile Telecommunication System

C. Unique Mobile Transfer System

D. Universal Mobile Transfer System

What is the correct answer?

4

Which of the following are the types of HTTP header?
a) General header
b) Entity header
c) Request header
d) Response header
Options:

A. A, B, C and D

B. C and D

C. A, B, and C

D. A and B

What is the correct answer?

4

In which network topology, all hosts are connected to the central device?

A. Star

B. Ring

C. Hybrid

D. Mesh