Data communication and networking Questions Practice Question and Answer
8 Q: 'Inbox' in e-mail client:
405 064a56031dc607a4d2b28e884
64a56031dc607a4d2b28e884- 1A place where sent e-mails are kept.false
- 2A place where unsolicited e-mail is kept.false
- 3A place where deleted e-mail is kept.false
- 4None of thesetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "None of these"
Explanation :
1. The inbox is the place where e-mail messages are received in an e-mail client or online e-mail account.
2. The Inbox is the default location for all incoming mail, unless rules are set to forward messages to another e-mail address, folder, or program.
3. All e-mail clients like Microsoft Outlook or Mozilla Thunderbird and online e-mail accounts like Gmail and Outlook.com have an Inbox folder.
Q: A valid example of a URL is:
457 064a54aa2b394764d11b1b23c
64a54aa2b394764d11b1b23c- 1CAVMOUQCA\ex.jpgfalse
- 2192.22.45.23.55false
- 3www.vmou.ac.in\qcatrue
- 4=SUM(B1,B2,B3)false
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "www.vmou.ac.in\qca"
Explanation :
1. In normal text ads, you define the display URL yourself: If your website address begins with a subdomain (for example, "support" in "support.google.com"), your display URL May include that subdomain.
2. In expanded text ads, your display URL is a combination of your website's domain (and, where applicable, subdomains) and the text in your “Path” field.
Q: Junk e-mail is called:
450 064a540acb394764d11b18bdf
64a540acb394764d11b18bdf- 1Spamtrue
- 2Spooffalse
- 3Sniffer scriptfalse
- 4Spoolfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Spam"
Explanation :
1. Junk email is called spam. Spam is an email that you did not request, and which usually promotes advertising or other unwanted content.
2. Spoofing is a special type of cyber-attack in which someone attempts to deceive other computer networks by using a computer, device, or network to identify themselves as a legitimate entity.
Q: The full name of FTP is:
436 064a52ef89a74b54cff5823ad
64a52ef89a74b54cff5823ad- 1File Transfer Protocoltrue
- 2Fast Trans Travel Protocolfalse
- 3File Tracking Protocolfalse
- 4File transfer processfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "File Transfer Protocol"
Explanation :
1. The full name of FTP is File Transfer Protocol.
2. It is a network protocol used to transfer files between two computers.
3. FTP is a two-way protocol, which means both computers can send and receive files from each other.
4. FTP runs in two main modes-
- Unprotected Mode: This mode transfers files without any protection.
- Secure Mode: This mode uses encryption to transfer files using SSL or TLS.
Q: Which statement is true for Router and Wretch?
466 063edfee03c221e1b4dd138d6
63edfee03c221e1b4dd138d6- 1Wretch connects two networks at data link layerfalse
- 2Router is more usefulfalse
- 3Router connects two networks at the Network Layer.false
- 4both (a) and (c)true
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "both (a) and (c)"
Q: Which of the following is the most difficult and secure device that LAN uses?
750 063e62e47cc37d41b3f99ce68
63e62e47cc37d41b3f99ce68- 1static routertrue
- 2IP Enabled Routerfalse
- 3dynamic routerfalse
- 4RIP enabled routerfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "static router"
Q: The company has a large network which is divided into smaller parts. By using which device LAN can be divided into different parts?
596 063e62de99353301b5ccd84f8
63e62de99353301b5ccd84f8- 1an internal firewallfalse
- 2router between subnetsfalse
- 3individual switch for departmentfalse
- 4all of the abovetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "all of the above"
Q: Which subnet is used for LAN security to bring stability in the Internet network?
561 063e62d813c221e1b4dbd9282
63e62d813c221e1b4dbd9282- 1static routertrue
- 2dynamic routerfalse
- 3static switchfalse
- 4dynamic switchfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice