Computer MCQs-2 with Explanation

 

Computer MCQs-1 

Answer with Explanation

1. What is the full form of CSMA?

[A] Carrier Sense Multiple Access
[B] Collision Sense Model Arrangement
[C] Carrier Sense Model Access
[D] None of the Above

 Explanation:

The most common access method of the bus topologies is CSMA or Carrier Sense Multiple Access. It is a media access control used to control the data flow so that data integrity is maintained so that the packets do not get lost.

 2. Which of the following devices has high bandwidth?

[A] Switch
[B] Router
[C] Modem
[D] Bridge

Explanation:
A network switch is a computer networking device that connects devices on a computer network by using packet switching to receive, process, and forward data to the destination device.
 

3. Which of the following noise may occur when signals at different frequencies share the same transmission medium?

[A] White noise
[B] Intermodulation noise
[C] Cross talk
[D] Impulse noise

Explanation:
When signals at different frequencies share the same transmission medium, the result may be intermodulation noise. Signals at a frequency that is the sum or difference of original frequencies or multiples of those frequencies will be produced.
 

4. Which of these network topologies have all the network nodes connected directly to each other?

[A] Bus
[B] Mesh
[C] Star
[D] Tree

Explanation:
Mesh topology is a point-to-point connection to other nodes or devices. All the network nodes are directly connected to each other.

5. What do we call the process of limiting bandwidth consumption by users?

[A] Bandwidth Shaping
[B] Downstreaming
[C] Net Neutrality
[D] Walling

Explanation:
Bandwidth Shaping refers to a tool used by ISPs to limit or direct bandwidth consumption by users. Bandwidth shaping is also called bandwidth allocation or referred to as a bandwidth management tool.
 

6. Which of the following are the basic functions of a gateway?

[A] Protocol Translation
[B] DHCP Service
[C] Network Address Translation
[D] All of the Above 

Explanation:
A gateway performs many function. Some of them are Protocol translation, network address translation and DHCP service. It is used to route the traffic from one network to another and to connect LAN to WAN or VPN.

7. Which of the following is an advantage of using Ring network topology?

[A] Troubleshooting is easy
[B] Failure of one computer has no effect on others
[C] Network is not affected by high traffic
[D] All of the above

Explanation:
In Ring topology, each computer is connected to another computer, with the last one connected to the first. Exactly two neighbours are there for each device. The advantage of using a Ring network topology is that the network is not affected by high traffic.

8. Which of the following techniques is used by UMTS?

[A] FDMA
[B] CDMA
[C] TDMA
[D] SDMA

Explanation:
UMTS uses wideband code division multiple access (W-CDMA) radio access technology which offers greater spectral efficiency and bandwidth to mobile network operators.

9. What is the maximum download speed offered under LTE-Advanced standard?

[A] 10 Mbps
[B] 100 Mbps
[C] 1 Gbps
[D] 10 Gbps

Explanation:
The maximum download speed offered under LTE-Advanced standard is 1 Gbps. The LTE advanced is the 10the version of LTE.

10. In which year ARPANET was shut down?

[A] 1992
[B] 1990
[C] 1988
[D] 1984

Explanation:
The ARPANET, which was initially funded by the Advanced Research Projects Agency (ARPA) of the United States Department of Defense, was shutdown and dismantled in the year 1990.

11. Which of these network protocol is used to synchronize the time of a server to another server?

[A] IGMP
[B] ARP
[C] NTP
[D] SSH

Explanation:
The Network Time Protocol is used to synchronize the time of a computer client or server to another server or reference time source, such as a radio or satellite receiver or modem.
 

12. Which was the final version of Internet Explorer before it got discontinued?

[A] 9
[B] 10
[C] 11
[D] 12
 

Explanation:
Microsoft Internet Explorer version 11 was the eleventh and final version of the browser. It was officially released in 2013 for Windows 8.1.

13. Which of the following is an employment-oriented social media network?

[A] Viber
[B] Pinterest
[C] Linkedin
[D] Line
 

Explanation:
Linkedin is a business and employment-oriented service which is mainly used for professional networking, including employers posting jobs and job seekers posting their CVs.

14. Which of the following is a famous social bookmarking website?

[A] Flickr
[B] Yelp
[C] Stumbleupon
[D] All of the above

Explanation:
Social bookmarking website is a site where users share other content from the Internet and rate and comment on the content. Stumbleupon and Digg are some examples.
 

15. Which of these companies own the search engine Bing?

[A] Google
[B] Microsoft
[C] Amazon
[D] IBM
 

Explanation:
Microsoft launched Bing on June 1, 2009. On July 29, 2009, Yahoo! and Microsoft agreed on a deal in which Yahoo! Search would be powered by Microsoft Bing technology.

16. What is trigger used for in MS PowerPoint?

[A] to start the slideshow
[B] to end the slideshow
[C] initiate a sequence of animations by clicking on a specific object
[D] to start random special effects when a particular key is pressed
 

Explanation:
Triggers allow users to initiate a sequence of animations by clicking on a specific object on the slide rather than simply clicking your mouse.

17. How many number of characters can be entered in a field name in MS Access 2010?

[A] 32
[B] 48
[C] 56
[D] 64

Explanation:
Number of characters in a field name in MS Access 2010 can be 64. Number of fields in a table can be a maximum of 255.

 18. What does OLE in MS Access stand for?

[A] Object Length Extension
[B] Object Linking and Embedding
[C] Object Load Estimate
[D] None of the above

 Explanation:

OLE stands for Object Linking and Embedding. It is a proprietary technology developed by Microsoft that allows embedding and linking to documents and other objects.

 19. Which protocol is used for fetching e-mail from a mailbox?

[A] FTP
[B] POP3
[C] HTTP
[D] IMAP

 Explanation:

POP3 is a client/server protocol in which e-mail is received and held by the Internet server. Periodically, the mail-box is checked on the server and download any mail, probably using POP3.

20. Which of these is not an email service provider?

[A] Yahoo
[B] Rediff
[C] WhatsApp
[D] Hotmail

 Explanation:

Gmail, Yahoo, Rediff, Hotmail, Outlook are some of the email service providers. WhatsApp is an instant messaging mobile application.

21. When was the first SMS sent?

[A] 1991
[B] 1992
[C] 1993
[D] 1994
 

Explanation:
The first-ever text message was sent December 3, 1992, by software engineer Neil Papworth, to Vodafone director Richard Jarvis, who received the SMS on his husky Orbitel 901 cell phone.
 

22. What do we call the malicious computer programs that gains root or administrative access to the computer?

[A] Antivirus
[B] Spamware
[C] Rootkits
[D] Backdoors

Explanation:
A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence.

23. Which of these is a correct UPI virtual address?

[A] abc-sbi
[B] abc
[C] abc@sbi.com
[D] abc@sbi

Explanation:
Virtual Payment Address or VPA is a unique ID you need to create in order to send and accept money via UPI.

24. Which of the following can work as access points in banking?

[A] ATMs
[B] Mobiles
[C] Computers
[D] All of above

 Explanation:

Access points are places or capabilities that are used to initiate or receive a payment. Access points can include bank branch offices, ATMs, terminals at the POS, agent outlets, mobile phones, and computers.

 25. Cloud Computing applications can be accessed by__?

[A] Special Protocols given by Cloud Service Providers
[B] Common Internet protocols and network standards
[C] Government controlled Network standards
[D] Privately developed protocols and standards

 Explanation:

Cloud Computing applications are accessed by common Internet protocols and networking standards.

Post a Comment (0)
Previous Post Next Post