Tuesday, April 17, 2012

MCQ On INTERNET & WEB TECHNOLOGY


Q.1    A header in CGI script can specify
       (A) format of the document.          (B) new location of the document.
       (C) (A) & (B) both.                  (D) start of the document.
Ans:  A
A header in CGI script can specify- Format of the document & New location of the document.

Q.2    All exceptions in Java are subclasses of built in class called
       (A) Exception                        (B) Error.
       (C) Throwable.                       (D) Raise.
Ans:   C
      All exception in Java are subclasses of built in class called Throwable.

Q.3    In 32bit IP Addressing scheme all 1’s represent
       (A) this computer.                   (B) directed broadcast.
       (C) limited broadcast.               (D) loop back.
Ans:   C
       In 32 bit IP Addressing scheme all 1’s represent limited broadcast.

Q.4    DMSP stands for
       (A)   Distributed Mail S ystem Protocol
       (B)   Distributed Message System Protocol
       (C)   Distributed Message System Pool
       (D)   Distributed Mail S ystem Pool
Ans:   A
      DMSP stands for – Distributed Mail system Protocol.
                                         
Q.5    Which Layer is not present in TCP/ IP model?
       (A) Application Layer                      (B) Internet Layer
       (C) Transport Layer                        (D) Presentation Layer
Ans:   D
       Presentation layer is not present in TCP/ IP Model.

Q.6    Let most segment of a name inn DNS represents
       (A) Individual Network.                    (B) Individual computer.
       (C) Domain name                            (D) Network t ype.
Ans:   B
        Left Most segment of a name in DNS represents- Individual computer

Q.7    Address 192.5.48.3 belongs to
       (A) class A.                               (B) class B.
       (C) class C.                               (D) class D.
Ans:   C
       Address 192.5.48.3 belongs to class C.

Q.8    Unlike Ipv4, Ipv6 does not include the following field in thee base header
       (A) Next Header field.                     (B) Field for Fragmentation
                                                                     information
       (B) Flow Label.                                (D) Kind field.
Ans:   B
       Unlike Ipv4, Ipv6 does not include the Field for Fragmentation information in the base header.

Q.9    The term b yte stuffing refers to:
       (A)   data  stuffing used   with character oriented hardware.
       (B)   data  stuffing used   with bit oriented hardware.
       (C)   data  stuffing used   with both (A) & (B)
       (D)   data  stuffing used   with b yte oriented hardware.
Ans:   A
      The term b yte stuffing refers to data stuffing used with character-oriented
       hardware.
                                              
Q.10   FDDI (Fiber Distributed Data Interconnect) is an example of
       (A) token ring.                     (B) token bus
       (C) star topology                   (D) multipoint network.
Ans:   A
        FDDI is an example of token ring.

Q.11   Hardware that calculates CRC(C yclic Redundancy Check) uses:
       (A) Shift register                  (B) Xor unit
       (C) Both (A) & (B)                  (D) Instruction register
Ans:   B
       Hardware that calculates CRC uses shift register and Xor unit.

Q.12   In TCP protocol header “checksum” is of___________
       (A) 8 bits                          (B) 16 bits
       (C) 32 bits                         (D) 64 bis
Ans:   B
       In TCP protocol header checksum is of 16 bits.

Q.13   In IP addressing scheme, class used for multicasting is:
       (A) Class A                         (B) Class B
       (C) Class C                         (D) Class D
Ans:   D
       In IP addressing scheme, class used for multicasting is class D.

Q.14   CIDR stands for
       (A)  Classified Internet Domain Routing
       (B)  Classless Inter Domain Routing
       (C)  Classless Internet Domain Routing
       (D)  Classified Inter Domain Routing
Ans:   B
       CIDR stands for Classless Inter Domain Routing.
                                        
Q.15   The total number of class of IP address are
       (A) 3.                                 (B) 4.
       (C) 5.                                 (D) 9.
Ans:   C
       The total number of class of IP addresses are 5.

Q.16   Parent class of all Java classes is
       (A) java.lang.s ystem                  (B) java.lang.object
       (C) java.lang.class                    (D) java.lang.reflect.object
Ans:   B
       Parent class of all Java classes is java.lang.object.

Q.17   Exceptions of t ype error inn JAVA are handled b y
       (A) User program                       (B) Java run time environment
       (C) Operating s ystem kerne            (D) Interrupt
Ans:   B
       Exceptions of t ype     error  in   JAVA    are   handled   b y J AVA run  time
       environment.

Q.18   Error detecting method that can detect more errors without increasing
       additional information in each packet is
       (A) checksum                           (B) even parit y mechanism
       (C) CRC                                (D) odd parit y mechanism.
Ans:   C
       Error detecting method that can detect more errors without increasing
       additional information in each packet is CRC.

Q.19   A Network uses a star topology if
       (A)  Computers are arranged in a closed loop.
       (B)  All computers attach to a central point.
       (C)  All computers attach to a single long cable.
       (D)  Computers attach to multiple hierarchical cables.
Ans:   B
       A Network uses a star topology if all computers attach to a central point.
                                           
Q.20   MTU is specified b y
       (A) IP Datagram size                 (B) Hardware technology
       (C) TCP Segment size                 (D) None of the above.
Ans:   B
       MTU is specified b y hardware technology.

Q.21   Network address prefixed b y 1110 is a
       (A) Class A address                  (B) Multicast address
       (C) Class B address                  (D) Reserve address.
Ans:   B
       Network address prefixed b y 1110 is a multicast address.

Q.22   FTP does not use
       (A)  Two transfer mode.
       (B)  Control connection to remote computer before file can be transferred.
       (C)  User Datagram Protocol.
       (D)  Authorization of a user through login and password verification.
Ans:   C
       FTP does not use User Datagram Protocol.

Q.23   A Header in CGI document can represent
       (A)  format of the document
       (B)  location if document used to different URL
       (C)  both (A) & (B)
       (D)  None of the above.
Ans:   B
       A header in CGI document can represent format of the document and the
       location if document used to different URL.

Q.24   127.0.0.1 is a
       (A) limited broadcast address        (B) direct broadcast address
       (C) multicast address                (D) loop-back address
Ans:   D
       127.0.0.1 is a loop-back address.
                                         
Q.25   In cyclic redundancy checking CRC is the
       (A) divisor                           (B) quotient.
       (C) dividend                          (D) remainder.
Ans:   D
       In cyclic redundancy checking CRC is the remainder.

Q.26   Which one of the following uses the greatest number of layers in the OSI
       model?
       (A) Bridge                            (B) Repeater.
       (C) Router.                           (D) Gateway.
Ans:   D
       Gateway uses the greatest number of layers in the OS I model.

Q.27   Which of the following 802 standard provides for a collision free protocol?
       (A) 802.2                             (B) 802.3
       (C) 802.5                             (D) 802.6
Ans:   C
       802.5 standards provides for a collision free protocol.

Q.28   The addressing especiall y used b y Transport Layer is
       (A) Station address                   (B) Network address
       (B) Application port address          (D) Dialog address
Ans:   B
       The addressing speciall y used b y transport layer is application port address.

Q.29   Which one of thee following is an error reporting protocol?
       (A) ARP                               (B) ICMP
       (C) TCP                               (D) UDP
Ans:   B
       ICMP is an error reporting protocol.
                                         
Q.30   Which t ype of web document is run at the client site
       (A) Static                            (B) Dynamic
       (C) Active                            (D) All of the above
Ans:   C
       Active web document is run at client side.

Q.31   The main function of a browser is to
       (A) compile HTML                      (B) interpret HTM L
       (C) de-compile HTML                   (D) interpret CGI programs
Ans:   B
       The main function of a browser is to interpret HTM L.

Q.32   Which of the following is associated with SNMP
       (A) SMI                               (B) BER
       (C) DNS                               (D) MIB
Ans:   D
       MIB is associated with SNMP.

Q.33   ATM is an example of
       (A) Ring topology                     (B) Star topology
       (C) Bus topology                      (D) None of the above.
Ans:   B     Star topology

Q.34   The first part of the address in electronic mailbox identifies:
       (A) User’s mailbox                    (B) Computer on which mail box resides
       (C) Both (A) & (B)                    (D) None of the above
Ans:   A      User’s mailnbox.

Q.35   Protocol used to monitor and control network devices operates at:
       (A) Application layer                 (B) Transport layer
       (C) Network layer                     (D) Data Link layer
Ans:   A      Application layer.
                      
Q.36   DHCP stands for
       (A) Dynamic Host Control Protocol
       (B) Dynamic Host Configuration Protocol.
       (C) Dynamic Host Connection Protocol.
       (D) None of the above.
Ans:   B    Dynamic Host Configuration Protocol.

Q.37   The transport protocol used b y TFTP (Trivial File Transfer Protocol) is:
       (A) FTP                             (B) UDP
       (C) TCP                             (D) IP
Ans:   B     UDP.

Q.38   The Environment variable SCR IPT_NAME in CGI script specifies:
       (A) Domain name of the computer running o server
       (B) The path of URL after server name.
       (C) Name of the server
       (D) None of the above.
Ans:   B  
The path of URL after server name.

Q.39   Application layer (layer 4) in TCP/IP model corresponds to:
       (A) Layer 4 and 5 in OSI model      (B) Layer 5 and 6 in OSI model
       (C) Layer 6 and 7 in OSI model      (D) Layer 1 and 2 in OSI model
Ans:   C 
Layer 6 and 7 in OS I model.

Q.40   UDP (User Diagram Protocol) is
       (A) Connectionless                  (B) Message Oriented
       (C) Connection oriented             (D) Both (A) and (B)
Ans:   D 
Both (A) and (B).

Q.41   A network address prefixed b y 1000 is:
       (A) Class A address                 (B) Class B address
       (C) Class C address                 (D) Class D address
Ans:   B    Class B address.
   
Q.42   In Java S ystem.out is an object of t ype
       (A) InputStream                       (B) PrintStream
       (C) OutputStream                     (D) None of the above.
Ans:   B    PrintStream.

No comments:

Post a Comment