| 1 |
In WAN. the communication software that allows a personal computer to appear as terminal is called |
Electronic mail software
Teleconferencing software
Terminal emulation software
Bulletin board system
|
| 2 |
The primary difference between a LAN and a WAN is |
The number of software programs available
Distance
The variety of hardware devices
The number of hardware devices
|
| 3 |
Which network covers a large area? |
LAN
WAN
MAN
PAN
|
| 4 |
Which problem occurs when two workstations on shared Ethernet try to access LAN at the same time? |
Termination
Deadlock
Collision
Accident
|
| 5 |
LAN does not use |
Twisted pair
Fiber optic
Telephone line
Coaxial cable
|
| 6 |
A lab with twenty computers and a laser printer is an example of _________ area network |
Little
Line
Local
Limited
|
| 7 |
LAN stands for |
Local Area nodes
Land Area Network
Local Area Network
Linked Area Network
|
| 8 |
Which of the following is NOT a category of network? |
WAN
LAN
MAN
NAN
|
| 9 |
A combination of both client/server and peer-to-peer network Is _________ network. |
Dedicated
Mixed
Merged
Hybrid
|
| 10 |
Many networks Include a central computer called |
Server
Bridge
Gateway
Client
|
| 11 |
Each computer on a network is called a |
Link
Code
Node
Mode
|
| 12 |
The technology of Iong distance communication is known as |
Mass communication
Telephony
Telecommunications
Telegrpahy
|
| 13 |
Computer Networks are the convergence of two important technologies |
Computing and telecommunication
Computing and mechanical
Computing and mechatronics
Computing and electrical
|
| 14 |
A collection of related fields in data organizing is called |
group
register
file
record
|
| 15 |
Real time system |
are effective in process control
process transactions by means of direct-access devices
process data in manner similar to batch-access devices
are not possible to achieve control
|
| 16 |
Simulation is a process in which |
computer is used to control a process
computer gather data for later processing
full capacity of the system is utilized
the computer system and program are used to produce actions similars to those in a real physical system
|
| 17 |
A 64 K-bit word computer has |
64 x 1000 bits
64 x 1012 bits
64 x 1020 bits
64 x 1024 bits
|
| 18 |
Debug is a term denoting |
error correction process
writing of instruction in developing a new program
fault detection in equipment
determine useful life
|
| 19 |
An interfact is basically a component that |
test the system
corrects the errors in program
allows two incompatible entities with one another
enhances the capability of a system/equipment
|
| 20 |
The term 'baud' is a measure of the |
speed at which data travels over a communications line
capacity of memory
error detection/correction capability of computer system
instruction execution time
|
| 21 |
Storage of 1K means that it has following number of storage locations |
1000
964
1024
1032
|
| 22 |
Real time computing is possible because of the following number of storage locations |
storage capability
high speed
accuracy
versatility
|
| 23 |
Micro processor is based on |
thermionic values
transistors
integrated circuits
single integrated circuit or chip
|
| 24 |
Which of the following is the example of sequential circuit |
flip-flop
counter
shift register
accumulator
|
| 25 |
The correct processing unit |
is operated from the control panel
is controlled by the auxiliary storage unit
is controlled by input as it enters the system
controls all input,output, and processing
|
| 26 |
Which of the following is termed ad minimum error code? |
Binary code
Gary code
Excess 3-code
Octal code
|
| 27 |
The act of reading new data into a register |
erases the previous contents of the register
is usually not possible
is possible only when the register is an accumulator
is possible only when the register is an accumulator or instruction register
|
| 28 |
The correct order of data hierarchy is |
bit-byte-record-field-file-data base
bit-byte-record-field-file-data base
bit-byte-file-record-field-data base
bit-byte-field-record-file-data base
|
| 29 |
An error in a computer hardware and software is called a bug. Another name for its is |
glitch
hacker
virus
pixel
|
| 30 |
How many input leads will be required for a chip containing four two-input Not gates? |
7
14
12
13
|