Which of following provides reliable communication?

Options: TCP B. IP C. UDP D. All of the above

Ans:– A ,

More Computer Networks Related questions:

A WATS arrangement
Options: is always less expensive than flat-rate service,    is less expensive than flat-rate service only when the number of calls is large and the duration of each is short,    is less expensive than flat-rate service only when the number of calls is small and the duration of each is long,    is never less expensive than flat-rate service

Ans:B ,B

.Which of the following data structure is not linear data structure?
Options: A)Arrays b.Linked lists c.Both of above d.None of above


Software that measures, monitors, analyzes, and controls real-world events is called:
Options: system software,    real-time software,    scientific software,    business software

Ans:B ,B

4.In Excel to open the Format Cells dialog box, press
Options: (A)Alt + 1 (B) Ctrl + 1 (C) Ctrl + Shift + 1 (D) F1 14

Ans:144. (B),144. (B)

andhra is sub river of which river
Options: chinab, yamuna, satluj, ravi


. Suppose you wanted to create an AutoCorrect entry that would type the words ‘We regret to inform you that your submission has been declined’ Of the following choices, which would be the best name you could assign to this entry?
Options: a. regret b. subdecl c. We regret to inform you that your submission has been declined d. 11

Ans: – B , – B

.   Which key deletes text before, or the left of, the insertion point?
Options: a. Backspace b. Page up c. Delete d. Page down

Ans:9 – A ,9 – A

1.Memory buffer register (MBR) contains
Options: (A)Data that is to be written into memory (B) A particular I/O device. (C) Exchange data between I/O module and the processor. (D) The instruction most recently fetched. 1

Ans:11. (A),11. (A)

5.The procedure for selecting multiple controls on a report?
Options: (A)Hold down the Shift key as you click each object that you want to select (B) If the controls are aligned along a horizontal or vertical line, click the horizontal or vertical ruler above or to the left of the controls (C) Hold down the Ctrl key as you click each object that you want to select (D) All of these above are true 9

Ans:95. (A),95. (A)

2.Using P-IV instead of P-I is due to
Options: (A)Requirement change (B) Faster access (C) Technology improvement (D) All the above 6

Ans:62. (D),62. (D)

Monte Carlo is an example of a(n)
Options: static model,    deterministic model,    optimizing model,    All of the above

Ans:D ,D

Which of the following memories needs refresh?
Options: DRAM B. SRAM C. ROM D. All of above

Ans:– A ,

5. you can copy command.com to your disk from hard disk
Options: a. true b. false    

Ans:Correct Answer: a ,Correct Answer: a

Which command is used to count just the number of characters in a file?
Options: wc - 1,    wc -c,    wc -w,    wc -r

Ans:B ,B

What is the Demilitarized Zone?
Options: The area between firewall & connection to an external network B. The area between ISP to Military area             C. The area surrounded by secured servers D. The area surrounded by the Military

Ans:– A ,

The intel 8086 microprocessor is a ___processor?
Options: NA

Ans:16 bit ,16 bit

Which commands is used to assign executable permission to all of the files named "letter"?
Options: chmod ugo+r letter,    chmod ugo+rw letter,    chmod u+x letter,    chmod ugo+x letter

Ans:D ,D

winner of first baba kanshi ram pahadi gandhi price in HP
Options: shri gangveer sing, sunil sharma, jaidev kiran

Ans:jaidev kiran,jaidev kiran

A DBMS that combines a DBMS and an application generator is ________ .
Options: Microsoft's SQL Server,    Microsoft's Access,    IBM's DB2,    Oracle Corporation's Oracle

Ans:B ,B

who was founder of das dynasty?


The explanation facility of an expert system may be used to:
Options: construct a diagnostic model,    expedite the debugging process,    explain the system's reasoning process,    All of the above

Ans:E ,E

. “Ctrl + Home” is used to
Options: Moves the cursor to the beginning of Document B. Moves the cursor to the beginning of Line C. Moves the cursor to the beginning of Paragraph D. All of the above

Ans:– A ,

4.Spoofing attack is
Options: (A)an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (B) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. (C) a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. (D) None of these 1

Ans:14. (C),14. (C)

Narayan chand Prashar


A dialog box with a bomb appears oh a Macintosh screen. What type of problem has occurred?
Options: A RAM problem,    A software problem,    A ROM problem,    An ADB problem

Ans:B ,B

What will be the output of the program ? #include<stdio.h> int main() { static int arr[] = {0, 1, 2, 3, 4}; int *p[] = {arr, arr+1, arr+2, arr+3, arr+4}; int **ptr=p; ptr++; printf("%d, %d, %d\n", ptr-p, *ptr-arr, **ptr); *ptr++; printf("%d, %d, %d\n", ptr-p, *ptr-arr, **ptr); *++ptr; printf("%d, %d, %d\n", ptr-p, *ptr-arr, **ptr); ++*ptr; printf("%d, %d, %d\n", ptr-p, *ptr-arr, **ptr); return 0; }
Options: 0, 0, 0 1, 1, 1 2, 2, 2 3, 3, 3,    1, 1, 2 2, 2, 3 3, 3, 4 4, 4, 1,    1, 1, 1 2, 2, 2 3, 3, 3 3, 4, 4,    0, 1, 2 1, 2, 3 2, 3, 4 3, 4, 5

Ans:C ,C

The Word Count command on the Tools menu displays the number of words as well as the number of _____ in the current document.
Options: a. lines b. characters c. paragraphs d. all of the above

Ans:– D,– D

9.In Microsoft PowerPoint the following toolbars provides different options in various master views
Options: (A)Common tasks toolbar (B) Drawing toolbar (C) Formatting toolbar (D) Standard toolbar 2

Ans:19. (A),19. (A)

A definition or a concept is ———————if it does not classify any examples as coming within the concept
Options: (A)Complete (B) Consistent (C) Constant (D) None of these 2

Ans:20. (B),20. (B)

. You were giving your presentation, and you need to click a slide that’s few slides back. How do you get there?
Options: a. Press ESC to get back into a normal view; click the slide thumbnail in normal view; then click the resume slide show button b. Press backspace until your desired slide c. Right click, point to go on the shortcut menu, point to by title, and click the slide you want to go to d. All of above

Ans:6 – C ,6 – C

Fool Yatra belongs to which district
Options: kinnaur , lahul, kullu, chamba


Who invented the first controllable flying AEROPLANE (AIRPLANE)?
Options: Wright Brothers,    Lidenbergh Brothers,    South Brothers,    West Brothers


Filaria is caused by
Options: Bacteria,    Mosquito,    Protozoa,    Virus


If you want to keep track of different editions of a document which features will you use?
Options:  A) Editions, B) Versions, C) Track Change, D) All of above, 


4.IR (Instruction register)
Options: (A)Contains the address of an instruction to be fetched. (B) Contains the instruction most recently fetched (C) Specifies memory addresses. (D) None of these.

Ans:4. (B),4. (B)

How many class A, B, and C network IDs can exist?
Options: 2,113,658,    16,382,    126,    128

Ans:A ,A

The file system “NTFS” stands for A)  New Type File System B)  Never Terminated File System C)  New Technology File System D)  Non Terminated File System

Ans: – C ,

A family of polynomial block codes designed to correct burst errors is known as
Options: Bar codes,    Gray codes,    Fire codes,    mnemonics codes

Ans:C ,C

An appraisal, of a system's performance after it has been installed, is called system
Options: planning,    review,    maintenance,    batch Processing

Ans:B ,B

The members of Lok Sabha hold office for a term of
Options: 4 years,    5 years,    6 years,    3 years


How can you totally protect a PC from damage during an electrical storm?
Options: Disconnect the AC power cable,    Disconnect all external cables and power cords,    Use a surge protector,    Turn off the AC power

Ans:A ,A

Which of the following column properties would be used to specify that cells in a column must contain a monetary value that is less than another monetary value in the same row?
Options: Null status,    Data type,    Default value,    Data constraints

Ans:D ,D

Which of the following is correctly matched?
Options: Nehru Trophy - Table Tennis,    B.C. Roy Trophy - Lawn Tennis,    Holkar Trophy - Bridge,    Ruia Trophy - Kabbadi


Cyclic codes are used in
Options: data transfer,    continuously varying signal representation,    arithmetic and logical computation,    All of the above

Ans:B ,B

Which of the following TCP/IP internet protocol a diskless machine uses to obtain its IP address from a server?
Options: RDP,    RARP,    RIP,    X.25

Ans:B ,B

When one must sell a project to management, the most important document he or she can produce is a:
Options: method for financing the project,    summary of the problem,    project evaluation,    procedure for purchase

Ans:C ,C

In a synchronous modem, the receive equalizer is known as
Options: adaptive equalizer,    impairment equalizer,    statistical equalizer,    compromise equalizer

Ans:A ,A

Average inventory level is reduced by
Options: decreasing the vendor lead time,    increasing the usage rate,    decreasing the order quantity,    lowering the reorder point

Ans:C ,C

First generation computers are characterised by
Options: Vaccum tubes and magnetic drum,    Minicomputers,    Magnetic tape and transistors,    All of the above

Ans:A ,A

7.In Excel to save a workbook, you
Options: (A)Click the save button on the standard toolbar from the menu (B) Press Ctrl+F5 (C) Click Save on the Windows Start button (D) Select Edit>Save 8

Ans:87. (A),87. (A)