1) BUS
2) RING
3) STAR
4) MESH
5) TREE
ANS: 1. BUS TOPOLOGY
Q2. Security (Encryption & Decryption) is performed at _____ layer of OSI.
1) APPLICATION
2) PRESENTATION
3) SESSION
4) TRANSPORT
5) NETWORK
ANS: 2. PRESENTATION LAYER
Q3. How many Columns and Rows are there in MS-EXCEL 2007 & Above respectively?
1) 256 & 65536
2) 256 & 1048576
3) 16384 & 65536
4) 16384 & 1048576
5) 65536 & 1048576
ANS: 4. 16384 & 1048576
Q4. A kind of MALWARE which takes permission from users before getting installed into the system is?
1) SPYWARE
2) VIRUS
3) WORM
4) TROJAN
5) BOTS
ANS: TROJAN
Q5. END to END delivery from one host to another is performed at which layer?
1) APPLICATION
2) PRESENTATION
3) SESSION
4) TRANSPORT
5) NETWORK
ANS: 4) TRANSPORT LAYER
Q6. Which of the following is an invalid IPv4 Address?
1) 169.2.0.111
2) 100.10.1.1
3) 244.111.123
4) 123.213.222.111
5) 32.23.123.50
ANS: 3) 244.111.123
Q7. Which of the following softwares DOES NOT use RICH TEXT?
1) MS-WORD
2) MS-POWERPOINT
3) WORDPAD
4) NOTEPAD
5) ALL OF THE ABOVE
ANS: 3) NOTEPAD
Q8. Which of the following is not related to MAC ADDRESS?
1) MEDIA ACCESS CONTROL
2) PHYSICAL ADDRESS
3) MACHINE ADDRESS
4) HARDWARE ADDRESS
5) LOGICAL ADDRESS
ANS: 5) LOGICAL ADDRESS
Q9. What is the size of IPv6 ADDRESS?
1) 32 bits
2) 64 bits
3) 96 bits
4) 128 bits
5) 48 bits
ANS: 4) 128 bits
Q10. SWITCH makes use of which of the following addresses?
1) PHYSICAL ADDRESS
2) LOGICAL ADDRESS
3) MAC ADDRESS
4) NO ADDRESS
5) SPECIFIC ADDRESS
ANS: 3) MAC ADDRESS