Data communication and networking Questions Practice Question and Answer

Q:

'Inbox' in e-mail client:

405 0

  • 1
    A place where sent e-mails are kept.
    Correct
    Wrong
  • 2
    A place where unsolicited e-mail is kept.
    Correct
    Wrong
  • 3
    A place where deleted e-mail is kept.
    Correct
    Wrong
  • 4
    None of these
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "None of these"
Explanation :

1. The inbox is the place where e-mail messages are received in an e-mail client or online e-mail account.

2. The Inbox is the default location for all incoming mail, unless rules are set to forward messages to another e-mail address, folder, or program.

3. All e-mail clients like Microsoft Outlook or Mozilla Thunderbird and online e-mail accounts like Gmail and Outlook.com have an Inbox folder.

Q:

A valid example of a URL is:

457 0

  • 1
    CAVMOUQCA\ex.jpg
    Correct
    Wrong
  • 2
    192.22.45.23.55
    Correct
    Wrong
  • 3
    www.vmou.ac.in\qca
    Correct
    Wrong
  • 4
    =SUM(B1,B2,B3)
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "www.vmou.ac.in\qca"
Explanation :

1. In normal text ads, you define the display URL yourself: If your website address begins with a subdomain (for example, "support" in "support.google.com"), your display URL May include that subdomain.

2. In expanded text ads, your display URL is a combination of your website's domain (and, where applicable, subdomains) and the text in your “Path” field.

Q:

Junk e-mail is called:

450 0

  • 1
    Spam
    Correct
    Wrong
  • 2
    Spoof
    Correct
    Wrong
  • 3
    Sniffer script
    Correct
    Wrong
  • 4
    Spool
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Spam"
Explanation :

1. Junk email is called spam. Spam is an email that you did not request, and which usually promotes advertising or other unwanted content.

2. Spoofing is a special type of cyber-attack in which someone attempts to deceive other computer networks by using a computer, device, or network to identify themselves as a legitimate entity.

Q:

The full name of FTP is:

436 0

  • 1
    File Transfer Protocol
    Correct
    Wrong
  • 2
    Fast Trans Travel Protocol
    Correct
    Wrong
  • 3
    File Tracking Protocol
    Correct
    Wrong
  • 4
    File transfer process
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "File Transfer Protocol"
Explanation :

1. The full name of FTP is File Transfer Protocol.

2. It is a network protocol used to transfer files between two computers.

3. FTP is a two-way protocol, which means both computers can send and receive files from each other.

4. FTP runs in two main modes-

- Unprotected Mode: This mode transfers files without any protection.

- Secure Mode: This mode uses encryption to transfer files using SSL or TLS.

Q:

Which statement is true for Router and Wretch?

466 0

  • 1
    Wretch connects two networks at data link layer
    Correct
    Wrong
  • 2
    Router is more useful
    Correct
    Wrong
  • 3
    Router connects two networks at the Network Layer.
    Correct
    Wrong
  • 4
    both (a) and (c)
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "both (a) and (c)"

Q:

Which of the following is the most difficult and secure device that LAN uses?

750 0

  • 1
    static router
    Correct
    Wrong
  • 2
    IP Enabled Router
    Correct
    Wrong
  • 3
    dynamic router
    Correct
    Wrong
  • 4
    RIP enabled router
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "static router"

Q:

The company has a large network which is divided into smaller parts. By using which device LAN can be divided into different parts?

596 0

  • 1
    an internal firewall
    Correct
    Wrong
  • 2
    router between subnets
    Correct
    Wrong
  • 3
    individual switch for department
    Correct
    Wrong
  • 4
    all of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "all of the above"

Q:

Which subnet is used for LAN security to bring stability in the Internet network?

561 0

  • 1
    static router
    Correct
    Wrong
  • 2
    dynamic router
    Correct
    Wrong
  • 3
    static switch
    Correct
    Wrong
  • 4
    dynamic switch
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "static router"

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully