Q: 1 Which part of the telephone device accepts voice and sends that information in the form of electromagnetic moves?
Receiver
Cable
Dialer
Mouth Piece
[ Option D ]
A telephone device has several main components:
| COMPONENT | FUNCTION |
|---|---|
| Mouthpiece / Microphone | Accepts voice and converts it into electrical or electromagnetic signals for transmission. |
| Receiver / Earpiece | Converts incoming electrical signals back into sound so the user can hear. |
| Dialer / Keypad | Used to enter phone numbers for making calls. |
| Cable / Network line | Transmits signals between devices. |
| Switch / Exchange | Connects calls between different telephones in a network. |
Q: 2 In http://www.ncert.nic.in/textbook/textbook.htm address which is the domain name and which web page is requested?
1. ncert.nic.in
2. http
3. textbook
4. textbook.htm
5. www
Choose the correct answer from the options given below:
1, 5
2, 3
4, 5
1, 4
[ Option D ]
When we access a website, we use a web address (URL) that contains several parts, each serving a specific function, from identifying the protocol used to specifying the exact web page we want to view.
| TERM | DESCRIPTION |
|---|---|
| Protocol | Rules for data transfer. Defines how data is communicated between browser and server. |
| WWW (World Wide Web) | Indicates the section or service of the website. |
| Domain Name | The main address of a website representing the organization or owner. |
| Top-Level Domain (TLD) | Highest-level domain extension. Specifies the domain type (.com, .org, .in, etc.) |
| Path / Directory | Folder location on server. Specifies where the requested page is stored on the website. |
| Web Page / File Name | The actual web file accessed. The specific file the browser displays. |
| URL (Uniform Resource Locator) | The complete address used to locate a web resource. |
In the web address (URL), http://www.ncert.nic.in/textbook/textbook.htm
| PART | MEANING |
|---|---|
| http | Protocol used (Hypertext Transfer Protocol). |
| www | Subdomain (World Wide Web). |
| ncert.nic.in | Domain Name. |
| /textbook/ | Directory or folder within the website. |
| textbook.htm | Web Page Requested. |
Q: 3 In GSM Architecture, which of the following stores the local copy of the data from the HLR?
MSC
VLR
AUC
Mobile Station
[ Option B ]
In GSM architecture, the Home Location Register (HLR) is a central database that stores permanent subscriber information, such as the subscriber’s profile, services, and current location. When a subscriber roams into a new area, the Visitor Location Register (VLR) temporarily stores a local copy of the subscriber’s data from the HLR.
Q: 4 Ethernet card is also known as—
New Interface Card
Network Interface Card
Network Interchange Card
Network Intermission Card
[ Option B ]
An Ethernet card is also commonly known as a Network Interface Card (NIC). It is a hardware component that allows a computer to connect to a network, usually a Local Area Network (LAN), using Ethernet technology.
The unique ID of a NIC on the Ethernet network is called its MAC (Media Access Control) address. The MAC address is a 48-bit (6 bytes) hexadecimal number, usually written in six pairs of hexadecimal digits separated by colons or hyphens, for example:
00:1A:2B:3C:4D:5E
Q: 5 The correct statement regarding WiFi and Wi-Max technology is/are-
(I) WiFi uses radio waves to create wireless connection, WiMax uses spectrum to deliver connection.
(II) WiFi is defined under IEEE 802.11x standards, while WiMax is defined under IEEE 803.16y standards.
(III) WiMax covers comparatively larger area than WiFi.
Only (II)
Only (I) and (II)
Only (I) and (III)
(I), (II) and (III)
[ Option C ]
WiFi and WiMAX are two popular wireless communication technologies, but they differ in coverage and standards. WiFi, based on the IEEE 802.11 family of standards, is mainly used for creating local area wireless networks with coverage typically up to 100 meters.
On the other hand, WiMAX is defined under the IEEE 802.16 standard and is designed for broadband wireless access over much larger distances, covering up to several kilometers.
The IEEE stands for Institute of Electrical and Electronics Engineers. IEEE develops global standards and supports a large community of engineers and scientists worldwide.
Q: 6 What is the term used for the word or phrase entered in the search box of a search engine?
Keywords
Homepage
Address
Web Address
[ Option A ]
When you type a word or phrase into the search box of a search engine like Google or Bing, that input is called search query or more commonly keywords. The search engine uses these keywords to find and display relevant results from its database.
| TERM | DESCRIPTION |
|---|---|
| Keyword | A word or phrase entered into a search engine to find relevant information. Example: typing “rssb computer question solution” in Google search. |
| Web Address (URL) | The unique address used to access a specific web page on the internet. Example: https://www.surakuacademy.com |
| Homepage | The main or starting page of a website, usually the first page you see when visiting a domain. It acts as the entry point to the rest of the site. Example: Suraku Academy homepage. |
Q: 7 GSM technology is combination of _____________.
TDMA and FDMA
TDMA and CDMA
CDMA and FDMA
TDMA, CDMA and FDMA
[ Option A ]
GSM (Global System for Mobile Communications) is a digital cellular technology that combines multiple access techniques to efficiently use the available radio spectrum.
GSM uses Frequency Division Multiple Access (FDMA) to divide the available frequency bands into separate channels, and Time Division Multiple Access (TDMA) to divide each frequency channel into time slots that can be shared by multiple users.
Q: 8 What is the full form of FTP in computer terminology?
File Transfer Protocol
File Transferred Protocol
Form Transfer Protocol
File Transmission Protocol
[ Option A ]
FTP stands for File Transfer Protocol. It is a standard network protocol used to transfer files between a client and a server over a network. FTP allows users to upload, download, rename, delete, and manage files on remote servers efficiently.
| PROTOCOL | FULL FORM | DESCRIPTION |
|---|---|---|
| DNS | Domain Name System | Translates domain names (like surakuacademy.com) into IP addresses. |
| IP | Internet Protocol | Provides addressing system for devices on a network. |
| HTTP | Hypertext Transfer Protocol | Used for accessing web pages on the internet. |
| HTTPS | Hypertext Transfer Protocol Secure | Secure version of HTTP with encryption (SSL/TLS). |
| SMTP | Simple Mail Transfer Protocol | Used for sending emails. |
| IMAP | Internet Message Access Protocol | Used for retrieving emails while keeping them on the server. |
| POP3 | Post Office Protocol Version 3 | Used for retrieving emails by downloading them to the device. |
| TCP | Transmission Control Protocol | Ensures reliable, ordered, and error-checked delivery of data. |
| UDP | User Datagram Protocol | Faster but less reliable data transfer. Generally used in video streaming, games. |
Q: 9 In Wi-Fi security, which of the following protocol is more used?
WPA
WPA2
WPS
Both (a) and (c)
[ Option B ]
WPA2 (Wi-Fi Protected Access 2) is the most widely used Wi-Fi security protocol. It was introduced in 2004 and uses AES (Advanced Encryption Standard) for strong encryption and security.
Q: 10 HTTPS uses __________ port number.
80
51
443
25
[ Option C ]
HTTPS (HyperText Transfer Protocol Secure) is the secure version of HTTP, which is used for communication between a web browser and a web server.
Unlike regular HTTP, HTTPS provides encryption and security using the SSL (Secure Sockets Layer) or TLS (Transport Layer Security) protocols. This ensures that any data exchanged, such as passwords, card details, or personal details is protected from unauthorized access.
Every network service on the internet uses a specific port number to communicate. By default, HTTP uses port 80, while HTTPs uses port 443.
Q: 11 Math List I with List II :
| List I | List II |
|---|---|
| a. Analog Signal | I. Amplify the weak signal and resend |
| b. Repeater | II. Connect multiple devices |
| c. Digital Signal | III. Continuous Signal |
| d. Hub | IV. Discontinuous Signal |
Choose the correct answer from the options given below:
a-III, b-I, c-II, d-IV
a-IV, b-II, c-III, d-I
a-III, b-I, c-IV, d-II
a-IV, b-I, c-II, d-III
[ Option C ]
In data communication, signals are used to transmit information between devices. There are two main types:
Repeater : A device that amplifies weak signals and retransmits them to extend network distance.
Hub : A device that connects multiple devices in a network and forwards data to all connected (broadcasting) devices.
Q: 12 Which amongst the following is not a search engine?
www
duckduckgo.com
bing.com
yahoo.com
[ Option A ]
WWW (World Wide Web) is not a search engine, it is a system of interlinked hypertext documents (collection of websites) accessible via the Internet. It is the platform on which websites and search engines operate.
A Search Engine is a software system that helps users find information on the Internet. It works by crawling web pages, indexing their content, and then retrieving the most relevant results when a user enters a query.
Search engines use algorithms to rank web pages based on factors like keywords, content quality, backlinks, and user engagement. The list of some important search engine are:
| SEARCH ENGINE | DESCRIPTION |
|---|---|
| The most widely used search engine, known for its fast, accurate, and AI-powered search results. | |
| Bing | The default search engine for Windows and Microsoft Edge, providing web, image, and video search. |
| Yahoo! | One of the earliest search engines, now uses Bing’s technology for search results. |
| DuckDuckGo | Focuses on user privacy and does not track user data or search history. |
| Baidu | The leading Chinese search engine, offering web, image, and multimedia search services. |
| Yandex | A popular Russian search engine offering services like maps, translation, and email alongside web search. |
| Ask.com | A question-answer–based search engine that also provides web search results. |
| Ecosia | An eco-friendly search engine that uses its ad revenue to plant trees. |
Q: 13 What is the port number of the HTTP?
80
25
20/21
23
[ Option A ]
The standard port number for HTTP (Hypertext Transfer Protocol) is 80. Port 80 is the default port used for web servers serving unencrypted traffic over HTTP.
| Protocol | Port Number | Usage |
|---|---|---|
| FTP | 20 (Data) 21 (Command) | File Transfer Protocol. |
| SSH | 22 | Secure Shell for Encrypted Remote Login. |
| Telnet | 23 | Remote Login (Unencrypted). |
| SMTP | 25 | Simple Mail Transfer Protocol (Email). |
| DNS | 53 | Domain Name System (Name Resolution). |
| HTTP | 80 | Hypertext Transfer Protocol (Web Browsing). |
| POP3 | 110 | Post Office Protocol Version 3 (Email Retrieval). |
| NTP | 123 | Network Time Protocol (Time Synchronization). |
| IMAP | 143 | Internet Message Access Protocol (Email Management). |
| HTTPS | 443 | Secure HTTP over TLS/SSL. |
| SMB | 445 | Server Message Block for File Sharing. |
| RDP | 3389 | Remote Desktop Protocol. |
| MySQL | 3306 | MySQL Database Service. |
| SIP | 5060/5061 | Session Initiation Protocol (VoIP Communication). |
| DHCP | 67 (Server) 68 (Client) | Dynamic Host Configuration Protocol. |
Q: 14 Size of IPv4 address is-
8 bits
32 bits
64 bits
128 bits
[ Option B ]
An IPv4 address is a 32-bit number used to uniquely identify a device on a network. It is usually represented in dotted decimal notation as four decimal numbers separated by dots, e.g., 192.248.0.1, where each number represents 8 bits.
| Feature | IPv4 | IPv6 |
|---|---|---|
| Address Size | 32-bit. | 128-bit. |
| Address Format | Dotted decimal notation. | Hexadecimal, colon-separated. |
| Address Classes | Classful addressing with classes A, B, C, D, E. | No concept of address classes. |
| Checksum | Present in header. | Not present. |
| Header Size | 20–60 bytes. | Fixed 40 bytes. |
| Configuration | Manual or DHCP. | Auto-configuration (SLAAC) and DHCPv6. |
| Security | IPSec optional. | IPSec mandatory. |
| Broadcast Support | Supports broadcast. | No broadcast (uses multicast and anycast). |
| Routing Efficiency | Less efficient due to large routing tables. | More efficient with hierarchical addressing. |
| NAT (Network Address Translation) | Widely used due to address shortage. | Not required because of large address space. |
| Subnet Mask | Supports CIDR and VLSM. | Supports CIDR but not VLSM. |
Q: 15 Every NIC Card attached to the node of a network has a unique MAC address. This MAC address is of _______ bit address.
48
96
128
256
[ Option A ]
Ethernet networks use MAC (Media Access Control) addresses as their physical addresses, which are permanently imprinted on the Network Interface Card (NIC) by the manufacturer. A MAC address is 48 bits long, equivalent to 6 bytes, and is usually represented in hexadecimal notation.
This unique identifier ensures that devices within the same local network can correctly recognize and communicate with each other.
Q: 16 How many layers are there in OSI Model?
3
7
4
6
[ Option B ]
The OSI (Open Systems Interconnection) model is a conceptual framework used to understand and standardize how different networking systems communicate over a network. It divides network communication into 7 layers, each serving a specific function.
| OSI LAYER | DATA UNIT | DESCRIPTION | DELIVERY |
|---|---|---|---|
| Physical | Bits | Transmits raw binary data over physical medium and defines cables, connectors, voltages, and signals. | Node to Node |
| Data Link | Frame | Provides error detection and correction and reliable transfer between adjacent nodes and handles MAC addressing. | Node (Hop) to Node (Hop) |
| Network | Packet | Determines the best path for data transmission and handles logical addressing (IP Addresses) and routing. | Host to Host |
| Transport | Segment | Ensures reliable data transfer, flow control and error recovery, TCP and UDP operate here. | Process to Process / End-to-End |
| Session | Data | Manages sessions and connections between applications, establishes, maintains, and terminates sessions | Process to Process / End-to-End |
| Presentation | Data | Translates, encrypts, compresses, or formats data for the application and ensures data is in usable form. | Process to Process / End-to-End |
| Application | Data | Provides network services to end-user applications like email, file transfer, and web browsing. | End-to-End |
Q: 17 Which of the following E-Mail protocol is used to move messages through the internet from source to destination?
SMTP
IMAP
POP
UDP
[ Option A ]
SMTP (Simple Mail Transfer Protocol) is the protocol used to transfer email messages from the sender's mail server to the recipient's mail server across the internet. It is an application layer protocol that uses TCP to reliably send and relay email messages between servers until reaching the destination server.
The IMAP (Internet Message Access Protocol) and POP (Post Office Protocol) are involved in email retrieval from mail servers to client devices, not in sending emails through the internet. UDP (User Datagram Protocol) is a transport protocol used for fast, connectionless communication.
Q: 18 Out of the following topologies which is the least secured and reliable?
Mesh
Star
Tree
Bus
[ Option D ]
In a Bus Topology, all computers are connected to a single central cable called the bus or backbone. Data sent by one computer is received by all others on the same network segment. This design makes it simple and inexpensive, but also less secure and less reliable compared to other topologies.
Network Topology refers to the physical or logical arrangement of computers, cables, and other devices in a network. It defines how nodes (computers, printers, switches, etc.) are connected and how data flows between them. There are two main types:
Choosing the right topology affects network performance, scalability, cost, and reliability.
| TOPOLOGY TYPE | DESCRIPTION | KEY POINTS |
|---|---|---|
| Bus Topology | All computers are connected to a single central cable called the bus or backbone. |
|
| Star Topology | All nodes are connected to a central hub or switch. Communication passes through the hub. |
|
| Ring Topology | Each computer is connected to two others, forming a closed loop. Data travels in one direction (or both in dual ring). |
|
| Mesh Topology | Every computer is connected to every other computer. |
|
| Tree (Hierarchical) Topology | Combination of star topologies arranged in a hierarchical structure. |
|
| Hybrid Topology | Combination of two or more different topologies (e.g., star-bus or star-ring). |
|
Q: 19 Network devices _______ and _______ are used at physical layer.
Gateway, Bridge
Router, Repeater
Hub, Switch
Repeater, Hub
[ Option D ]
Physical Layer of the OSI model deals with the transmission of raw bitstreams over a physical medium. Network devices operating at the physical layer are responsible for transmitting and regenerating signals without interpreting the data.
Repeaters regenerate and amplify signals to extend the range of a network without any processing of the data.
Hubs serve as basic central connection points in Ethernet networks, forwarding signals to all ports and operating purely at the physical layer.
| Network Device | OSI Layer(s) | Description |
|---|---|---|
| Repeater | Physical Layer | Regenerates and amplifies signals to extend network coverage. |
| Hub | Physical Layer | Multiport repeater that broadcasts incoming signals to all ports, no filtering or processing. |
| Network Interface Card (NIC) | Physical & Data Link Layer | Provides physical connection and MAC addressing. |
| Bridge | Data Link Layer | Connects two LAN segments and filters traffic based on MAC addresses. |
| Switch | Data Link Layer | Connects multiple devices on a LAN and selectively forwards data based on MAC addresses. |
| Router | Network Layer | Forwards packets based on IP addresses across different networks. |
| Gateway | All Layers | Connects different network architectures / protocols, can perform protocol translation. |
| Modem | Physical & Data Link Layer | Modulates and demodulates analog signals for digital data transmission. |
| Firewall | Network Layer & Higher Layers | Controls access, filters traffic based on rules, and protects networks from threats. |
| Access Point (AP) | Physical & Data Link Layer | Connects wireless devices to a wired LAN, bridges wireless and wired networks. |
Q: 20 Which of the following is a type of computer network?
RING
BUS
STAR
PAN
[ Option D ]
A computer network is a collection of computers and devices connected to share resources and data.
PAN (Personal Area Network) is a type of computer network. PAN refers to a network for interconnecting devices within a very small area, typically within a person's reach (e.g., Bluetooth devices).
Ring, Bus, Star , Tree, Mesh and Hybrid, are types of network topologies. They describe how computers or devices are physically or logically connected in a network.
| NETWORK TYPE | NETWORK TOPOLOGY |
|---|---|
| Defines the range or size of the network. | Defines the physical or logical layout of the network. |
| Examples: LAN, MAN, WAN, CAN, PAN. | Examples: Bus, Ring, Star, Mesh, Tree, Hybrid. |
| Focuses on geographical coverage. | Focuses on connection pattern between devices. |
| Determines how far devices are spread. | Determines how devices are interconnected. |
Q: 21 In the context of mobile computing, GSM stands for:
Global System for Mobile Communications
Global Positioning System for Mobile phones
Guaranteed Security for Mobility
Graded protocol for Safety Management
[ Option A ]
GSM stands for Global System for Mobile Communications. It was developed by ETSI (European Telecommunications Standards Institute) in the late 1980s. In the context of mobile computing, GSM is the widely adopted standard for cellular networks.
It defines the protocols for digital mobile communication, enabling voice calls, text messaging, and data transfer over mobile networks.
Q: 22 IPv4 address has a size of –
32 bit
64 bit
128 bit
256 bit
[ Option A ]
An IPv4 address is a 32-bit number used to uniquely identify a device on a network. It is usually represented in dotted decimal notation as four decimal numbers separated by dots, e.g., 192.248.0.1, where each number represents 8 bits.
| Feature | IPv4 | IPv6 |
|---|---|---|
| Address Size | 32-bit. | 128-bit. |
| Address Format | Dotted decimal notation. | Hexadecimal, colon-separated. |
| Address Classes | Classful addressing with classes A, B, C, D, E. | No concept of address classes. |
| Checksum | Present in header. | Not present. |
| Header Size | 20–60 bytes. | Fixed 40 bytes. |
| Configuration | Manual or DHCP. | Auto-configuration (SLAAC) and DHCPv6. |
| Security | IPSec optional. | IPSec mandatory. |
| Broadcast Support | Supports broadcast. | No broadcast (uses multicast and anycast). |
| Routing Efficiency | Less efficient due to large routing tables. | More efficient with hierarchical addressing. |
| NAT (Network Address Translation) | Widely used due to address shortage. | Not required because of large address space. |
| Subnet Mask | Supports CIDR and VLSM. | Supports CIDR but not VLSM. |
Q: 23 __________ is a networking device that extracts the destination address from the data packet and searches for the destination to send the packet. It sends the signals to only selected device.
Wires
Server
Switch
Hub
[ Option C ]
A Switch is an intelligent networking device used to connect multiple computers or devices within a Local Area Network (LAN).
The switch operates at the Data Link Layer (Layer 2) of the OSI Model and is capable of reading the MAC (Media Access Control) address from each incoming data packet. The switch then forwards the packet only to the specific device (destination) for which it is intended.
This selective forwarding reduces network traffic and collisions, improving overall network efficiency and security.
| DEVICE | FUNCTION | KEY POINT |
|---|---|---|
| Hub | Broadcasts data to all devices on the network. | Less efficient, causes network congestion. |
| Switch | Sends data only to the target device. | Faster, secure, reduces collisions. |
Q: 24 Each computer connected to the internet has got its unique identity in the form of its _________.
Web Browser
IP Address
Email ID
URL
[ Option B ]
When a computer is connected to the internet, it needs a way to identify itself uniquely so that data can be sent and received correctly. This unique identity is called an IP Address (Internet Protocol Address).
| TERM | DESCRIPTION |
|---|---|
| Web Browser | Software application used to access and view websites on the internet. Examples: Chrome, Firefox, Edge. It interprets HTML, CSS, and scripts to display web pages. |
| Web Server | A computer or software that stores and delivers websites to users over the internet. Examples: Apache, Nginx. It handles HTTP requests from browsers and sends web pages as responses. |
| IP (Internet Protocol) Address | A unique numeric identifier assigned to every device on a network. It ensures that data sent over the internet reaches the correct device. The size of IPv4 is 32-bit and IPv6 is 128-bit. Example: 192.168.1.1 |
| MAC (Media Access Control) Address | A unique hardware identifier for a Network Interface Card (NIC) in a device. It is 48-bit (6-bytes) hexadecimal and helps in identifying devices on local networks. Example: 00:1A:2B:3C:4D:5E |
| URL (Uniform Resource Locator) | The address used to access a specific resource on the internet, like a webpage or file. Example: https://www.surakuacademy.com |
Q: 25 Ethernet uses ________ physical address that is imprinted on the Network Interface Card (NIC).
48-bits
48-bytes
4-bytes
128-bits
[ Option A ]
Ethernet networks use MAC (Media Access Control) addresses as their physical addresses, which are permanently imprinted on the Network Interface Card (NIC) by the manufacturer. A MAC address is 48 bits long, equivalent to 6 bytes, and is usually represented in hexadecimal notation.
This unique identifier ensures that devices within the same local network can correctly recognize and communicate with each other.
Q: 26 HTTP stands for ___________________.
Higher Text Transfer Protocol
Hyper Text Technical Protocol
Hyper Text Transmission Protocol
Hyper Text Transfer Protocol
[ Option D ]
HTTP is the foundation of communication on the World Wide Web (WWW). It defines how messages are formatted and transmitted between a web browser (client) and a web server (server). When you type https://www.surakuacademy.com, your browser uses HTTP to request the webpage from the server.
| HTTP | HTTPS |
|---|---|
| Hyper Text Transfer Protocol. | Hyper Text Transfer Protocol Secure. |
| Uses Port 80. | Uses Port 443. |
| Data is not encrypted. | Data is encrypted using SSL/TLS. |
| URL starts with http:// | URL starts with https:// |
| Less secure, vulnerable to hacking. | More secure, protects against hacking. |
| Does not verify website identity. | Verifies website identity with SSL certificate. |
Q: 27 Which of the following medium access mechanism use in Ethernet?
CSMA/CD
CSMA/CA
Token passing
ALOHA
[ Option A ]
Ethernet is the most widely used Local Area Network (LAN) technology. It defines both the Physical Layer (cabling, signaling) and the Data Link Layer (framing, access control). Because multiple devices share the same communication medium, Ethernet uses a Medium Access Control (MAC) mechanism to decide who can transmit at a given time.
The original Ethernet (Coaxial) and early shared-media Ethernet used CSMA/CD (Carrier Sense Multiple Access with Collision Detection).
| LAN TYPE | MEDIUM ACCESS MECHANISM | COLLISION STATUS |
|---|---|---|
| Ethernet | CSMA/CD | Collision-Prone, detects and retransmits. |
| Wi-Fi (802.11) | CSMA/CA | Collision avoidance, uses RTS/CTS. |
| Token Ring | Token Passing | Collision-free. |
| ALOHA Networks | ALOHA | Collision-prone, retransmit on collision. |
Q: 28 ARP stands for –
Address Routing Protocol
Address Routing Packet
Address Resolution Protocol
Address Routing Program
[ Option C ]
ARP (Address Resolution Protocol) is a network protocol used to map an IP Address (Logical Address) to a physical MAC Address (Physical Address) in a network.
For example, when a computer wants to send data to another device on the same network, it first uses ARP to find out the MAC address corresponding to the known IP address. This ensures that the data packets are delivered to the correct device.
Q: 29 In a Data Entry Office, the computer centers are on 1st and 4th floor. Both the centres are connected three LAN. However, the signals take time to travel. Which amongst the following hardware can improve the data transmission?
Modem
Repeater
Router
Computer
[ Option B ]
A Repeater is a networking device used to amplify and regenerate weak signals to extend the transmission distance between network devices. Repeaters operate at the Physical Layer (Layer 1) of the OSI model and do not route or manage traffic. They simply regenerate signals to maintain quality over longer distances.
Modem: A device that converts digital signals from a computer into analog signals for transmission over telephone lines or cable networks, and vice versa. It enables devices to connect to the Internet.
Router: A networking device that directs data packets between different networks, such as between a LAN and the Internet, ensuring that data reaches the correct destination efficiently.
Q: 30 What is data transfer rate? (Choose the most appropriate option from below)
The number of bits transmitted between register and source in 5 minutes.
The number of channels available.
The number of register travels.
The number of bits transmitted between source and destination in one second.
[ Option D ]
Data Transfer Rate is the measurement of how much data (in bits or bytes) is transmitted from one place (source) to another (destination) in a given amount of time, typically one second.
It is commonly measured in bits per second (bps), kilobits per second (Kbps), megabits per second (Mbps), or gigabits per second (Gbps).
| TERM | DESCRIPTION | UNIT OF MEASUREMENT | SIMPLE ANALOGY |
|---|---|---|---|
| Data Transfer Rate | The number of bits transferred per second between source and destination. How fast data is moving currently. | bits per second (bps) | Speedometer on a car. |
| Bandwidth | Maximum capacity of a channel or medium. | bits per second (bps) | Width of a highway. |
| Throughput | Actual amount of data successfully transmitted in a given time. | bits per second (bps) | Cars actually passing on the highway. |
| Latency | Time delay for data to travel from source to destination. | milliseconds (ms) | Travel time to work. |
| Packet Loss | Percentage of data packets that get lost or dropped during transmission, requiring retransmission. | Percentage (%) | Cars breaking down on the road. |
| Jitter | Variation in packet arrival times causing inconsistency in delay. | milliseconds (ms) | Traffic lights changing irregularly. |
Q: 31 All the search engines use ___________ data where the data is generated from the data itself, such as logical database designs.
Operational
Non-Operational
Meta
None of these
[ Option C ]
All search engines use Metadata, which is data about data. Metadata provides information describing other data, for example, a file’s name, size, date created, author, or content type.
In the context of Search Engines, metadata helps in organizing, indexing, and retrieving web pages efficiently. For instance, HTML meta tags (title, description, keywords) tell search engines what a webpage is about, improving its visibility in search results.
Q: 32 Which of the following service is created to confirm if the given computer (with given IP address) exists and is connected to network?
Ring
Ding
Sing
Ping
[ Option D ]
Ping is a network utility used to test the connectivity between your computer and another device on a network using its IP address or domain name.
It works by sending ICMP (Internet Control Message Protocol) Echo Request messages to the target device and waits for an Echo Reply.
| COMMAND | FUNCTION | EXAMPLE |
|---|---|---|
| ping | Tests if a computer or server is reachable and measures response time. | ping 192.168.1.1 |
| ipconfig | Displays the IP configuration of your computer. | ipconfig |
| tracert | Shows the route packets take to reach a destination | tracert surakuacademy.com |
| nslookup | Queries DNS to find the IP of a domain. | nslookup surakuacademy.com |
| netstat | Displays active network connections and listening ports. | netstat -an |
| ftp | Transfers files between computers over TCP/IP. | ftp 192.168.1.10 |
Q: 33 The address of website is called:
Location
URL
ID
DNS
[ Option B ]
Every website on the internet has a unique address that helps browsers locate and access it. This address is known as a URL (Uniform Resource Locator).
A URL typically consists of: https://www.surakuacademy.com/rssb-previous-exam-computer-question-solution, where
| PART | MEANING |
|---|---|
| https:// | Protocol, defines how data is transferred. |
| www.surakuacademy.com | Domain name of website. |
| /rssb-previous-exam-computer-question-solution | Specific page or file on the site. |
Q: 34 What services are used to make website available for 24*7 all over the world?
Video Conferencing
Web Hosting
HTTP
Telecommuting
[ Option B ]
Web Hosting is a service that allows individuals or organizations to publish a website on the Internet. Hosting providers maintain servers that are always connected to the Internet, ensuring the website is available 24×7 globally.
Q: 35 In mesh topology, the requirement of number of wires for ‘n’ number of computers can be calculated using the formula ___________.
(n*(n-1))/2
(n+(n-1))/2
(n*(n+1))/2
(n+(n+1))/2
[ Option A ]
In a Mesh Topology, every computer (node) is connected directly to every other computer in the network. If there are n computers, each computer connects to (n − 1) others.
Number of connections (links / wires) = (n*(n-1))/2. If there are 5 computers, then (5*(5-4)/2) = 5*4/2 =10. So, 10 cables are required to form a full mesh.
Q: 36
Match the following modes of communications in Column – I to their descriptions in Column – II:
| Column – I | Column – II |
|---|---|
| a. Simplex | i. Links that allow traffic in only one direction. |
| b. Half-Duplex | ii. Links that can be used in both directions at the same time. |
| c. Full-Duplex | iii. Links that can be used in either direction, but only one way at a time. |
a – i, b – iii, c – ii
a – ii, b – iii, c – i
a – iii, b – ii, c – i
a – ii, b – i, c – iii
[ Option A ]
Modes of data exchange, also called communication modes, describe how data flows between two devices.
| TRANSMISSION MODE | DESCRIPTION | EXAMPLE |
|---|---|---|
| Simplex | Data flows in only one direction, one device is sender, the other is receiver. | TV broadcast, Keyboard to computer input. |
| Half-Duplex | Data can flow in both directions, but only one direction at a time. | Walkie-Talkie. |
| Full-Duplex | Data flows in both directions simultaneously. | Telephone conversation. |
Q: 37 In FTP, there are three types of ……………., stream, block and compressed.
File Types
Data Types
Transmission Modes
None of these
[ Option C ]
FTP (File Transfer Protocol) is used to transfer files between a client and a server on a network. In FTP, data can be transferred using different transmission modes that determine how the file data is sent over the connection.
Q: 38 Identify the gateway for simple internet connectivity at homes.
Internet Service Provider (ISP)
Server
LAN
WAN
[ Option A ]
For simple internet connectivity at home, the gateway that allows users to connect to the Internet is typically provided by the Internet Service Provider (ISP).
When you access the internet from your home (through Wi-Fi, broadband, or mobile data), your ISP provides the necessary network connection, IP address, and routing to link your local network to the global Internet. Some examples of ISP are BSNL,VI, Airtel, Jio, ACT, Hathway, etc.
Q: 39 Which of the following is the most reliable protocol?
FTP
UDP
POP
TCP
[ Option D ]
A network protocol defines rules for communication between devices. Reliability in networking means data is delivered correctly and in order.
Therefore, TCP is the most reliable protocol.
Q: 40 In LAN, connectivity can be created using Wi-Fi, or _____________ cables.
TV
Radio
Mobile
Ethernet
[ Option D ]
In a Local Area Network (LAN), devices can be connected either wirelessly using Wi-Fi or wired using Ethernet Cables. Ethernet cables provide a reliable, high-speed, and stable connection between computers, printers, switches, and other network devices within the LAN.
Q: 41 Which of the following is not provided by Digital Signature directly?
Authentication
Integrity
Non-repudiation
Confidential communication
[ Option D ]
A Digital Signature is a cryptographic tool used to verify the authenticity and integrity of a message. It ensures that the sender of the message can be verified (Authentication) and that the message has not been altered in transit (Integrity). Digital signatures also provide Non-Repudiation, meaning the sender cannot deny having sent the message.
| Feature | Explanation |
|---|---|
| Authentication | Verifies the identity of the sender. |
| Integrity | Ensures the message has not been altered. |
| Non-repudiation | Prevents the sender from denying they sent the message. |
However, Digital Signatures do not provide Confidentiality, they do not encrypt the content of the message.
Q: 42 What is BCC in email?
Blind Carbon Copy
Blind Content Copy
Bind Carbon Copy
Bind Content Copy
[ Option A ]
BCC stands for Blind Carbon Copy. It is used in E-Mails to send a copy of the message to additional recipients without showing their email addresses to the other recipients.
| FIELD | VISIBILITY | PURPOSE |
|---|---|---|
| To | Visible to all. | Main recipient(s) of the email. Everyone in the email can see who is in the "To" field. |
| CC | Visible to all. | Sends a copy to additional recipients. Everyone can see who has been included in the "CC" field. |
| BCC | Hidden from all. | “Blind” means HIDDEN. People in the BCC field receive the email, but other recipients cannot see their email addresses. |
Q: 43 ___________ converts the analogue voice signals into digital and then transmitting them over the broadband line.
Video Conferencing
VOIP
Chatting
Website
[ Option B ]
Voice over Internet Protocol (VoIP) technology converts analog voice signals into digital data and then transmits them over broadband internet lines. This digital conversion allows voice communication to be sent as packets over IP networks rather than traditional telephone lines.
Q: 44 All the information on the internet is passed using _____________ switching method.
Portable
Packets
Pouch
Primary
[ Option B ]
All information transmitted over the Internet uses the Packet Switching method. In packet switching, data is broken into small packets before being sent across the network.
Switching Techniques are methods used in network communication to transfer data from a source device to a destination device across a network. They determine how data travels, whether through a dedicated path, divided into packets, or stored temporarily before forwarding.
| SWITCHING TECHNIQUE | DESCRIPTION | KEY POINTS |
|---|---|---|
| Packet Switching | Data is divided into small packets, each sent independently over the network and reassembled at the destination. | Efficient use of bandwidth, reliable, flexible routing, used in Internet. |
| Circuit Switching | A dedicated communication path is established between sender and receiver before data transfer begins. | Guaranteed constant connection, low latency, used in traditional telephone networks. |
| Message Switching | Entire message is stored and forwarded from one intermediate device to another. | No dedicated path needed, can handle large messages, may cause delay due to store-and-forward. |
| Cell Switching | Data is broken into small fixed-size cells and transmitted through the network. | Combines benefits of packet and circuit switching, predictable delay, suitable for real-time applications. |
Q: 45 IPSEC, IP Encapsulation and Tunneling are the technologies used in ____________ only.
Intranet
TCP
VPN
Internet
[ Option C ]
IPSEC, IP encapsulation, and tunneling are technologies used primarily in Virtual Private Network (VPN) to securely transmit data over public or untrusted networks like the Internet.
Q: 46 Which of the following is not the possible way of data exchange?
Half-Duplex
Full-Duplex
Simplex
Multiplex
[ Option D ]
Modes of data exchange, also called communication modes, describe how data flows between two devices.
| TRANSMISSION MODE | DESCRIPTION | EXAMPLE |
|---|---|---|
| Simplex | Data flows in only one direction, one device is sender, the other is receiver. | TV broadcast, Keyboard to computer input. |
| Half-Duplex | Data can flow in both directions, but only one direction at a time. | Walkie-Talkie. |
| Full-Duplex | Data flows in both directions simultaneously. | Telephone conversation. |
Q: 47 Which of the following comes under remote login?
1. Video Conferencing
2. Talking on Phone
3. Telnet
4. Any PC
Choose the most appropriate answer from the options given below:
Only 1
1 and 2
Only 3
3 and 4
[ Option C ]
Remote Login allows a user to access and control a computer from a different location over a network, typically the Internet. Telnet (Terminal Network) is a protocol used for remote login, allowing users to log in to a remote computer and execute commands as if they were physically present. Telnet uses Port 23.
Q: 48 Anuj is trying to transfer money to an agency from his bank. On trying multiple times, connection to the bank failed. Because of the financial transactions, certain cookies helps to terminate the session where there is a time-out. These cookies are known as _______ cookies.
E-commerce
Session
Authentication
E-banking
[ Option B ]
A Cookie is a small text file stored on a user’s computer by a web browser when visiting a website.
Cookies store information about the user's interactions and preferences on the site to provide a better personalized experience. They help websites remember login status, items in shopping carts, user settings, and track user activity for analytics or advertising.
Session Cookies are temporary cookies that are created when a user starts an online session and are automatically deleted when the browser is closed or the session expires.
| COOKIE TYPE | DESCRIPTION | EXAMPLE |
|---|---|---|
| Session Cookie | Temporary cookies that store data only for a single session. They are deleted automatically when the browser is closed. | Used in online banking, shopping carts, or secure login sessions. |
| Persistent Cookie | Remains stored on the user’s device even after the browser is closed. They help in remembering user preferences or login details for future visits. | Used for remember me features or language settings. |
| Secure Cookie | Transmitted only over encrypted HTTPS connections. | Safeguard sensitive information like login credentials. |
| HttpOnly Cookie | Not accessible via JavaScript, used to reduce cross-site scripting attacks. | Used to store session identifiers securely. |
| Third-Party Cookie | Created by domains other than the one the user is visiting, usually for advertising or tracking purposes. | Used in online ads and analytics tools. |
Q: 49 Which method is used for both error detection and error correction method in computer networking?
Single Parity Check
Hamming Distance
Cyclic Redundancy Check (CRC)
Checksum
[ Option B ]
Single Parity Check, Checksum, and Cyclic Redundancy Check (CRC) are primarily error detection methods. They detect if an error has occurred in the transmitted data but do not necessarily correct the errors.
Hamming Distance refers to Hamming Code, which is a method used for both error detection and error correction. It can detect and correct single-bit errors by adding redundant bits to the data.
Q: 50 Which of the following is NOT a type of computer network?
LAN (Large Area Network)
MAN (Metropolitan Area Network)
WAN (Wide Area Network)
PAN (Personal Area Network)
[ Option A ]
| NETWORK TYPE | COVERAGE AREA | EXAMPLE |
|---|---|---|
| LAN (Local Area Network) | Small area (building, office, campus) | Office computers connected within a building. |
| MAN (Metropolitan Area Network) | Medium area (city or large campus) | University network connecting multiple buildings. |
| WAN (Wide Area Network) | Large area (cities, countries, continents) | The Internet connecting worldwide networks. |
| PAN (Personal Area Network) | Very small area (within a few meters) | Bluetooth connection between smartphone and wireless headphones. |
Q: 51 Network layer firewall works as a—
Frame Filter
Packet Filter
Both (a) and (b)
None of these
[ Option B ]
A Network Layer firewall functions as a Packet Filter. It examines and manages the flow of data packets according to rules defined by IP addresses, Port Numbers, and communication protocols. Operating at the Network Layer (Layer 3) of the OSI model, this type of firewall makes decisions on whether to permit or deny packets without analyzing the actual data content inside them.
Q: 52 The commonly used protocol for webpage transfer is-
HTML
HTTP
WML
WTTP
[ Option B ]
HTTP (Hypertext Transfer Protocol), is the standard protocol used to transfer web pages over the internet. It works at the Application Layer, allowing communication between web browsers and web servers. When a browser requests a webpage, HTTP facilitates sending that request to the server and receiving the webpage content, such as HTML, images, and videos, in response.
This protocol follows a client-server model, where the browser acts as the client initiating the request, and the server processes the request and sends back the required webpage data. Through this request-response communication, HTTP enables users to access and view websites on the internet efficiently.
Thank you so much for taking the time to read my Computer Science MCQs section carefully. Your support and interest mean a lot, and I truly appreciate you being part of this journey. Stay connected for more insights and updates! If you'd like to explore more tutorials and insights, check out my YouTube channel.
Don’t forget to subscribe and stay connected for future updates.