it tools and network basics -

it tools and network basics

it tools and network basics 50 Questions with Answers 

Hello Students ,if you are searching exam material for o level  it tools and network basics exam that you are on right place, so must read the complete questions with answers also click on the link that i given below at last of Part-3

1. Which transmission technology guarantees that the data packets will be received by the receiver in the same order in which they are being sent by the sender?
a. Circuit switching
b. Packet switching
c. Unicasting
d. Broadcasting

2. Which of the following  is considered a element of cyber security
a. Application security
b. Operational security
c. Network security
d. All of the above.

3.Which one is non volatile and it can only be written once
a. PROM
b. EPROM
c. EEPROM
d. RAM

4. When mail  server sents mail to  other mail servers so it becomes
a. SMTP Server
b. SMTP Client
c. Peer to peer
d. None of these.

5. Proxy server is also known as _____
a. Application proxy
b. Proxy tools
c. Application-level gateway
d. None of these

6.what are the two modes IP security
a. Preshared and transport
b. Certificate and tunnel
c. Transport and tunnel
d. Transport and certificate

7. Recogonize that  malware who  does not replicate or clone by infection
a. Virus
b. Worms
c. Trojans
d. None of these.

8. In Binary numbering system  0 and 1 is called as
a. Bits
b. Decimal bytes
c. Kilobytes
d. Bytes

9. Which of the following is not used as a medium of 802.3 Ethernet
a. A fiber optical cable
b. A microwave link
c. A twisted pair cable
d. A thin coaxial cable

10. Reconize that network that extends a private network over a private network
a. Local Area Network
b. Enterprise Private Network
c. Virtual Private Network
d. Storage Area Network

11.Which layer is responsible for encryptions and decryptions?
a. Datalink
b. Application
c. Network
d. None of these.

12.Which layer of TCP/IP stack matches with OSI model transport layer
a. Network access
b. Internet
c. Application
d. Host to host

13. What is a HUB ?
a. Calculating device
b. Network device
c. Computing device
d. Software

14. Which of the following  hardware component is very important for Database management system operation
a. Plotter
b. High speed, large-capacity disk
c. Printer
d. High-resolution video display

15. Which of the following network usedc dynamic and  adaptive routing
a. System Network Architecture (SNA)
b. ARPANET
c. TYMNET
d. None of these.

16. Recogize very old phone hacking technique that are used by Hackers for Free calls.
a. Phishing
b. Cracking
c. Phreaking
d. Spamming

17. The term IPv4 stands for ___ ?
a. International Programming Version 4
b. Internet Programming Version 4
c. Internet Protocol Version 4
d. None of these.

18. What does a set of rules define?
a. Protocol
b. IMAP
c. FTP
d. SMTP

19. In any file time-to-time records checks, change and  delete is called as____
a. Renewing
b. Restructuring
c. Upgrading
d. Updating

20. The basic architecture of Computer is developed by
a. Garden Moore
b. Blaise Pascal
c. Charles Babbage
d. John Von Neumann

21.Which of the following platforms is used for security and protection of information in the cloud?
a. One drive
b. Cloud security protocols
c. Cloud workload protection platforms
d. None of these.

22. Which of the following shares data between two computers?
a. Integrated system
b. Grouping
c. Network
d. Library

23. Which is primarly used to Host a website website
a. Database Server
b. Web Server
c. Mail Server
d. None of these.

24. What is the name biven by Database management system who is able to handle  full text data, image data, audio  and video data
a. Hypertext
b. Multimedia
c. Graphics media
d. Full media

25. The time during which a task is processed by the computer
a.waiting time
b. Real Time
c. Delay Time
d. Execution Time

26. Which Protocol is very used Wi-fi security
a. WPA2
b. WPA
c. WPS
d. None of these.

27. What is the Default line spacing of LibreOffice writer
a. 1.5
b. Double
c. Single
d. None of these.

28. Which of the following is required for a customer to use Internet banking
a. Customer ID and password
b. Customer name and password
c. Customer ID and date of birth
d. Customer ID and phone number

29. Which option is used to configure  scope of Cookie visibility?
a. Path
b. Domain
c. Server
d. Both (a) and (b)

30. Which of the following topology arrangements is a  point-to-point configuration ?
a. Star topology
b. Mesh topology
c. Ring topology
d. All of the above.

31. Which one is a valid e-mail address ?
a. shubh@gmail.com
b. shubh@gmail
c. gmail.com
d. None of these.

32. Which one is a database administrator function 
a. Performance Monitoring
b. Backup the Database
c. Database Design
d. All of the above.

33. Which of the following is not speciality of  computer 
a. Automation
b. Versatility
c. Speed
d. Intelligence

34. The full form of DBMS is ___ ?
a. Database Management Software
b. Domain based Management Software
c. Database Management System
d. Digital Bar Management System

35. Which of the following is sequential access memory
a. Optical Disk
b. Magnetic Disk
c. Magnetic Tape
d. None of these.

36. BIOS is a type of ___ 
a. Operating System
b. Hardware
c. Software
d. None of these.

37. What is Worm Booting 
a. Starting the Computer normally
b. Restart Computer
c. Both (a) and (b)
d. None of these.

38. The process of removing unwanted part of an image is called
a. Cropping
b. Merging
c. Cutting
d. Hidin

39. Which command is given to print first 5 pages of any document?
a. Print all
b. From__ To__
c. Both (a) and (b)
d. None of these

40. What is the output of =concatenate(“ram”,”sita”)?
a. ramsita
b. RamSita
c. RAMSITA
d. ram sita

41. Which animation is used to rotate a shape or a picture 
a. Flyer over
b. Zoom
c. Color plus
d. Spin

42. First graphical browser was____
a. Opera
b. Chrome
c. Edge
d. Mosaic

43. Which protocol is used by remote login 
a. SMTP
b. Telnet
c. FTP
d. HTTP

44. Which of the following is a valid domain
a. www.careersknowledge.com
b. www.com.careersknowledge
c. Both (a) and (b)
d. None of these.

45. ___ SMTP is used to send messages
a. User Mailbox
b. User Terminal
c. Both (a) and (b)
d. None of these.

46.How many maximum members we can add in telegram group 
a. 150000
b. 500000
c. 200000
d. 50000

47. Which of the following is a method to funds transfer through  Internet
a. Core Banking
b. NEFT
c. SMTP
d. MICR

48. How much money we can sent through BHIM UPI ?
a. 1 lakh
b. 5 lakhs
c. 20 lakhs
d. 50 thousand

49. Which is benefit of cloud computing?
a. More secure
b. Fast speed
c. Low cost
d. All of the above.

50. Which of the following is a cryptocurrency ?
a. Bitcoin
b. Voice coin
c. Sia coin
d. All of the above.

I hope you will get mostly ans of the topic it tools and network basics exams.

For Our Video Classes join our Youtube Channel subscribe the channel click on the link

Youtube

For o level it tools and network basics exam question (Part 3) click on the link

O level it tools questions (part-3)

2 thoughts on “it tools and network basics”

Leave a Comment