Computer Questions for IBPS Clerk Mains 2016

December 30, 2016    

Q1. ______are attempts by individuals to obtain confidential information from you by falsifying their identity.
(a) Phishing trips
(b) Computer viruses
(c) Spyware scams
(d) Phishing scam
(e) Trojan horses

Q2. End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages.
Encryption and decryption are function of:
(a) Transport layer
(b) Session layer
(c) Presentation layer
(d) All of the above
(e) None of the above
Q3. A gateway can be used on which of the following layers of the OSI model?
(a) Application
(b) Network
(c) Session
(d) All of the above
(e) None of the above
Q4. There is a device called a ____ which will function similar to a bridge for network transport protocols that are not routable, and will function as a router for routable protocols.
(a) Router
(b) Gateway
(c) Brouter
(e) Switch
Q5. In which layer is the repeater used in the OSI model?
(a) Physical layer
(b) Network layer
(c) Transport layer
(d) Application layer
(e) Session layer
Q6. A _____ is a device that forwards packets between networks by processing the routing information included in the packet.
(a) Bridge
(b) Firewall
(c) Router
(d) Switch
(e) Gateway
Q7.  Wi-Fi is technically an industry term that represents a type of wireless____ protocol based on the 802.11 IEEE network standard.
Q8. What do you mean by modulation of a signal?
(a) Sending a file from one system to other system
(b) Transmitting higher frequency signal over a lower frequency signal
(c) Transmitting lower frequency signal over higher frequency signal
(d) Creating duplicate copy of every received character
(e) None of these
Q9. How many layers are there in the TCP/IP protocol suite?
Q10. What is the technical term for the devices connected in a network?
(c) Sections
(d) Attachments units
(e) Access points
Q11. ________ is a type of transmission impairment in which the signal loses strength due to the different propagation speeds of each frequency that makes up the signal.
(a) Attenuation
(b) Distortion
(d) Decibel
(e) None of these
Q12. The TCP/IP _______ layer is equivalent to the combined session, presentation, and application layers of the OSI model.
(a) application
(b) network
(c) data link
(d) physical
(e) None of these
Q13. Congestion control is done by :
(a)Network layer
(b)Physical layer
(c)Presentation layer
(d)Application layer
(e)None of these
Q14. ADSL, SDSL, HDSL, and VDSL are examples of different types of _______________________.
(a) Digital Subscriber Lines
(b) digital modems
(c) cable-based broadband
(d) subscriber loop carriers
(e) None of these
Q15. The baud rate is :
(a) always equal to the bit transfer rate
(b) equal to twice the bandwidth of an ideal channel
(c) not equal to the signalling rate
(d) equal to half of the bandwidth of an ideal channel
(e) none of these 

This article passed through the Full-Text RSS service - if this is your content and you're reading it on someone else's site, please read the FAQ at fivefilters.org/content-only/faq.php#publishers.
Recommended article: The Guardian's Summary of Julian Assange's Interview Went Viral and Was Completely False.


- http://www.bankersadda.com/2016/12/computer-questions-for-ibps-clerk-mains_30.html
Computer Questions for IBPS Clerk Mains 2016 4.5 5 Yateendra sahu December 30, 2016 Q1. ______are attempts by individuals to obtain confidential information from you by falsifying their identity. (a) Phishing trips (b) C...


Load comments

No comments:

Post a Comment