Q 1: | Which of the following is used to derive the address, of record from the record key |
(1) | Field |
(2) | Comma |
(3) | Hashing |
(4) | Variable |
Correct Answer: Hashing | |
Q 2: | How is composition represented in a class diagram? |
(1) | A circlw |
(2) | A rounded rectangle |
(3) | An ellise |
(4) | A solid diamond |
Correct Answer: A solid diamond | |
Q 3: | DHCP is used for |
(1) | IPv4 |
(2) | IPv6 |
(3) | Both |
(4) | None |
Correct Answer: Both | |
Q 4: | What operates in the Data Link and the Network Layer? |
(1) | Bridge |
(2) | Brouter |
(3) | Router |
(4) | NIC |
Correct Answer: Brouter | |
Q 5: | In cyclic redundancy checking the divisor is........ the CRC |
(1) | The same size as |
(2) | one bit less than |
(3) | one bit more than |
(4) | none |
Correct Answer: one bit more than | |
Q 6: | Class...... has the greatest number of hosts per given network address |
(1) | D |
(2) | A |
(3) | B |
(4) | C |
Correct Answer: A | |
Q 7: | Which protocol does Ping use? |
(1) | TCP |
(2) | ARP |
(3) | ICMP |
(4) | BootP |
Correct Answer: ICMP | |
Q 8: | A RTP packet is encapsulated in.................... |
(1) | a UDP user datagram |
(2) | a TCP segment |
(3) | an IP datagram |
(4) | None |
Correct Answer: a UDP user datagram | |
Q 9: | The entity type of which the. ........ type depends is called the identifying owner. |
(1) | E-R |
(2) | Relationship |
(3) | Weak entity |
(4) | Strong Entity |
Correct Answer: Weak entity | |
Q 10: | Which of the operations constitute a basic set of operations for manipulating relational data |
(1) | Predicate calculus |
(2) | Relational calculus |
(3) | Relational algebra |
(4) | None |
Correct Answer: Relational algebra | |