1.World Wide Web (WWW)
4.Hypertext markup language
A proxy server is used as the computer?
1.(a) with external access
2.acting as a backup
3.performing file handling
4.accessing user permissions
At what speed does tele-computed refer?
2.Cycles per second
3. Baud rate
1. Encryption of data
2.To transmit faster
3.To detect errors
4.To identify the user
Software programs that allow you to legally copy files and give them away at no cost are called which of the following?
The IP network 192.168.50.0 is to be divided into 10 equal sized subnets. Which of the following subnet masks can be used for the above requirement?
The length of an IPv6 address is?
3. E-mail address
The term FTP stands for?
1.File transfer program
2.File transmission protocol
3.File transfer protocol
4.File transfer protection
The term HTTP stands for?
1.Hyper terminal tracing program
2.Hypertext tracing protocol
3.Hypertext transfer protocol
4.Hypertext transfer program
What kind of transmission medium is most appropriate to carry data in a computer network that is exposed to electrical interferences?
1.Unshielded twisted pair
1. SMTP client
1.Sorting data on a disk drive
2.Sending information to a host computer
3.Receiving information from a host computer
4.Sorting data on a hard drive
Which of the following statements could be valid with respect to the ICMP (Internet Control Message Protocol)?
1.It reports all errors which occur during transmission.
2.A redirect message is used when a router notices that a packet seems to have been routed wrongly.
3.It informs routers when an incorrect path has been taken.
4.The “destination unreachable” type message is used when a router cannot locate the destination.
4.Peer to Peer
Which one of the following would breach the integrity of a system? (a) Looking the room to prevent theft (b) Full access rights for all users (c) Fitting the system with an anti-theft device (d) Protecting the device against willful or accidental damage
1. Looking the room to prevent theft
2.Full access rights for all users
3.Fitting the system with an anti-theft device
4.Protecting the device against willful or accidental damage
4. Virus checker
Which type of topology is best suited for large businesses which must carefully control and coordinate the operation of distributed branch outlets?