91. Match the following IEEE No to their corresponding Name for IEEE 802 standards for LANs.
(i) 802.3 (a) WiFi
(ii) 802.11 (b) WiMa
(iii) 802.15.1 (c) Ethernet
(iv) 802.16 (d) Bluetooth
(A) i-b, ii-c, iii-d, iv-a
(B) i-c, ii-d, iii-a, iv-b
(C) i-c, ii-a, iii-d, iv-b
(D) i-b, ii-d, iii-c, iv-a
Show Answer
Hide Answer
92. Which of the following are Gigabit Ethernet’s?
(A) 1000 BASE-SX
(B) 1000 BASE-LX
(C) 1000 BASE-CX
(D) All of above
Show Answer
Hide Answer
93. Loopback address ……………………. of IPv6 address is equivalent to the IPV4 loopback address 127.0.0.1.
(A) (: : 1)
(B) (: : )
(C) (: : 0)
(D) (1 : : )
Show Answer
Hide Answer
94. The ……………. is used to provide integrity check, authentication and encryption to IP datagram.
(A) SSL
(B) ESP
(C) TSL
(D) PSL
Show Answer
Hide Answer
95. In ………. forwarding, the mask and destination addresses are both 0.0.0.0 in the routing table.
(A) next-hop
(B) network-specific
(C) host-specific
(D) default
Show Answer
Hide Answer
96. UDP packets have fixed-size header of ………. bytes.
(A) 16
(B) 8
(C) 32
(D) 64
Show Answer
Hide Answer
97. A port address in TCP/IP is ………bits long.
(A) 32
(B) 48
(C) 16
(D) 64
Show Answer
Hide Answer
98. The internet addresses are ……… bits in length in IPV4 addressing scheme.
(A) 16
(B) 64
(C) 32
(D) 48
Show Answer
Hide Answer
99. DBMS is a collection of ………….. that enables user to create and maintain a database.
(A) Keys
(B) Translators
(C) Program
(D) Language Activity
Show Answer
Hide Answer
100. ………. keyword is used to find the number of values in a column.
(A) TOTAL
(B) COUNT
(C) ADD
(D) SUM
Show Answer
Hide Answer
101. …………..defines the structure of a relation which consists of a fixed set of attribute-domain pairs.
(A) Instance
(B) Schema
(C) Program
(D) Super Key
Show Answer
Hide Answer
102. ………………….. operator is basically a join followed by a project on the attributes of first relation.
(A) Join
(B) Semi-Join
(C) Full Join
(D) Inner Join
Show Answer
Hide Answer
103. The relational model is based on the concept that data is organized and stored in two-dimensional tables called ……………………….
(A) Fields
(B) Records
(C) Relations
(D) Keys
Show Answer
Hide Answer
104. ……………..specifies a search condition for a group or an aggregate.
(A) GROUP BY Clause
(B) HAVING Clause
(C) FROM Clause
(D) WHERE Clause
Show Answer
Hide Answer
105. Anything that affects the database schema is a part of
(A) DML
(B) DCL
(C) DDL
(D) All of the above
Show Answer
Hide Answer
106. Which of the following is not a characteristic of a relational database model?
(A) Table
(B) Tree like structure
(C) Complex logical relationship
(D) Records
Show Answer
Hide Answer
107. Which of the following query is correct for using comparison operators in SQL?
(A) SELECT sname, coursename FROM studentinfo WHERE age>50 and <80;
(B) SELECT sname, coursename FROM studentinfo WHERE age>50 and age <80;
(C) SELECT sname, coursename FROM studentinfo WHERE age>50 and WHERE age<80;
(D) None of the above
Show Answer
Hide Answer
108. …………………… is the full form of SQL.
(A) Standard Query Language
(B) Sequential Query Language
(C) Structured Query Language
(D) Server Side Query Language
Show Answer
Hide Answer
109. …………………. are used to recreate if trigger already exists.
(A) Cursor
(B) Trigger
(C) Keywords
(D) Replace
Show Answer
Hide Answer
110. …………………. software resides only in read only memory and is used to control products and systems for the consumer and industrial markets.
(B) Embedded
(C) System
(D) Personal
Show Answer
Hide Answer