Wednesday, 27 December 2017



Which network device is used to segment a big network in to smaller networks?
a) Router     b) Gateway        c) Bridge           d) Modem

Name the software technique that validates the authenticity of documents over internet.
a) Cookie    b) Digital Signature     c)  Firewall          d) Spam

Which protocol translates the IP address in to the Ethernet MAC address?
a) ARP           b) RARP            d)    PPP             e)   POP

Which network protocol is used to establish communication between a Computer and ISP over the Telephone line?
a) PPP       b)  Telnet    c)   SMTP      d) SNMP

Which network device translates the Private IP address to a Public IP address?
a) Router       b) Gateway      c) firewall      d) Modem

This program is designed to replicate itself and fill the memory space of a computer.
a) Trojan      b) Virus      c) Spyware     d) Worm

We need to pay for further use of this type of software after a short period of free use.
a) Freeware     b) Adware    c)  Shareware     d) Proprietary software

With which Java Swing controls the following methods are associated:
a) setSelected()    b) dispose()     c) getModel()      d)  getSelectedIndex()

No comments:

Post a Comment