|
Which
network device is used to segment a big network in to smaller networks?
a)
Router b) Gateway c) Bridge d) Modem
|
|
Name
the software technique that validates the authenticity of documents over
internet.
a)
Cookie b) Digital Signature c)
Firewall d) Spam
|
|
Which
protocol translates the IP address in to the Ethernet MAC address?
a)
ARP b) RARP d) PPP e) POP
|
|
Which
network protocol is used to establish communication between a Computer and
ISP over the Telephone line?
a)
PPP b) Telnet
c) SMTP d) SNMP
|
|
Which
network device translates the Private IP address to a Public IP address?
a)
Router b) Gateway c) firewall d) Modem
|
|
This
program is designed to replicate itself and fill the memory space of a
computer.
a)
Trojan b) Virus c) Spyware d) Worm
|
|
We
need to pay for further use of this type of software after a short period of
free use.
a)
Freeware b) Adware c)
Shareware d) Proprietary
software
|
|
With
which Java Swing controls the following methods are associated:
a)
setSelected() b) dispose() c) getModel() d)
getSelectedIndex()
|
Wednesday, 27 December 2017
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment