1. Full Form of ISR is ________.
a) Interrupt Service Request
b) Interrupt Service Routine
c) Interrupt Service Response
d) Interrupt S/W Request
e) None of these
2. Which protocol does Ping use?
a) TCP
b) ARP
c) ICMP
d) BootP
e) None of these
3. What is the storage area for email messages called?
a) A folder
b) A directory
c) A mailbox
d) The hard disk
e) None of these
4. A device operating at the physical layer is called a ________.
a) Bridge
b) Router
c) Repeater
d) All of the above
e) None of these
5. A (n) __________ allows sharing of a broadband Internet connection.
a) hub
b) adapter
c) router
d) switch
e) plug
6. ADSL is the abbreviation of _________.
a) Asymmetric Dual System Line
b) Asymmetric Dual Subscriber Line
c) Asymmetric Digital Subscriber Line
d) Asymmetric Digital System Line
e) None of these
7. When we run a program in HTML coding _______ is used as backend and _______ works as front-end.
a) Notepad – Internet-Explorer
b) Notepad - Msn-messenger
c) MS-Word – Internet Explorer
d) Both (A) and (B)
e) None of these
8. ________ is the most important/powerful computer in a typical network.
a) Desktop
b) Network client
c) Network server
d) Bank
e) None of these
9. The "home page" of a web site is _________.
a) the largest page
b) the last page
c) the first page
d) the most colourful page
e) None of these
10. What is a Firewall in Computer Network?
a) An operating System of Computer Network
b) The physical boundary of Network
c) A web browsing Software
d) A system designed to prevent unauthorized access
e) None of these
Answers:
1. b) Interrupt Service Routine2. c) ICMP3. c) A mailbox4. c) Repeater5. c) router6. c) Asymmetric Digital Subscriber Line7. a) Notepad – Internet-Explorer8. c) Network server9. c) the first page10. d) A system designed to prevent unauthorized access
Thanks.