| Q 1: | Which of the following is used to derive the address, of record from the record key |
| (1) | Field |
| (2) | Comma |
| (3) | Hashing |
| (4) | Variable |
| Correct Answer: Hashing | |
| Q 2: | How is composition represented in a class diagram? |
| (1) | A circlw |
| (2) | A rounded rectangle |
| (3) | An ellise |
| (4) | A solid diamond |
| Correct Answer: A solid diamond | |
| Q 3: | DHCP is used for |
| (1) | IPv4 |
| (2) | IPv6 |
| (3) | Both |
| (4) | None |
| Correct Answer: Both | |
| Q 4: | What operates in the Data Link and the Network Layer? |
| (1) | Bridge |
| (2) | Brouter |
| (3) | Router |
| (4) | NIC |
| Correct Answer: Brouter | |
| Q 5: | In cyclic redundancy checking the divisor is........ the CRC |
| (1) | The same size as |
| (2) | one bit less than |
| (3) | one bit more than |
| (4) | none |
| Correct Answer: one bit more than | |
| Q 6: | Class...... has the greatest number of hosts per given network address |
| (1) | D |
| (2) | A |
| (3) | B |
| (4) | C |
| Correct Answer: A | |
| Q 7: | Which protocol does Ping use? |
| (1) | TCP |
| (2) | ARP |
| (3) | ICMP |
| (4) | BootP |
| Correct Answer: ICMP | |
| Q 8: | A RTP packet is encapsulated in.................... |
| (1) | a UDP user datagram |
| (2) | a TCP segment |
| (3) | an IP datagram |
| (4) | None |
| Correct Answer: a UDP user datagram | |
| Q 9: | The entity type of which the. ........ type depends is called the identifying owner. |
| (1) | E-R |
| (2) | Relationship |
| (3) | Weak entity |
| (4) | Strong Entity |
| Correct Answer: Weak entity | |
| Q 10: | Which of the operations constitute a basic set of operations for manipulating relational data |
| (1) | Predicate calculus |
| (2) | Relational calculus |
| (3) | Relational algebra |
| (4) | None |
| Correct Answer: Relational algebra | |