header1.html

Monday, 25 February 2013

Data Communication and Networking Part-1


1.What is the minimum number of wires needed to send data over a serial communication link layer
A.1
B.2
C.3
D.4
Click for answer 

B.2
2.Which data communication method is used to send data over a serial communication link?
A.Simplex
B. Half Duplex
C.Full Duplex
D.All of these
Click for answer 

C.Full Duplex
3.The interactive transmission of data within a time sharing system may be best suited to..
A.Simplex Lines
B. Half Duplex Lines
C.Full Duplex Lines
D.biflex lines
Click for answer 

B.Half Duplex Lines
4.Which of the following is an example of bounded medium?
A.Coaxial cable
B. wave guide
C.Fibre optic cable
D.All of these.
Click for answer 

D.All of these
5.Coaxial cable has conductors with
A.Equal resistance
B.same diameter
C.Different diameter
D.a common axis
Click for answer 

D.a common axis
6.A central computer surrounded by one or more satellite computers is called..
A.Ring Network.
B.Star network.
C.Bus network
D.none ofv these
Click for answer 

B. Star network.
7.The forms of information that may be sent electronically are
A.voice.
B.data
C.video
D.All Of these.
Click for answer 

D.All Of these.
8.The basic compont necessary for communication is a...
A.computer terminal
B.modem.
C.communication s/w
D.All of these.
Click for answer 

D.All of these

Computer Awareness for government jobs-part2..


This post is continuation of my First Postplease have look here Computer Awareness for government jobs-part1

1.The _____ states that a foreign key must either match a primary key value in another relation or it must be null.
A.referential integrity constraint
B.action assertion
C.composite attribute
D.entity integrity rule
Click for answer 

D.entity integrity rule
2.A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.
A.system virus
B. macro virus
C.none of these
D.both
Click for answer 

C.none of these
3.Which error detection method uses one's complement arithmetic?
A.Simply parity check
B. Checksum
C.Two-dimensional parity check
D.CRC
Click for answer 

B.Checksum
4.A result of a computer virus can not lead to ___.
A.Disk Crash.
B. Corruption of program.
C.Mother Board Crash
D.Deletion of files.
Click for answer 

C.Mother Board Crash
5.The network interface card of LAN is related to following layer of OSI Model-
A.Transport
B.Physical
C.Data Link
D.All of these
Click for answer 

D.All of these
6.Which of the following does not describe a data warehouse?
A.Subject-oriented.
B. Updateable.
C.Time-variant.
D.Integrated
Click for answer 

B. Updateable.
7.Which of the following is true ?
A.Logical design is software-dependent.
B.In a distributed database, database is stored in one physical location
C.Conceptual design translates the logical design into internal model
D.Logical design is software independent.
Click for answer 

A.Logical design is software-dependent.
8.A range check _____
A.determines whether a number is within a specified limit.
B.tests if the data in two or more associated fields is logical.
C.verifies that all required data is present.
D.ensures that only the correct data type is entered into a field.
Click for answer 

A.determines whether a number is within a specified limit.