Get Email Subscription

Enter your email address:

Delivered by FeedBurner

Showing posts with label True or False. Show all posts
Showing posts with label True or False. Show all posts

Thursday, April 15, 2010

Tybcom Computer Objective (Internet Objective)


 INTERNET

1.                     Connection of computers through out globe is Internet.(T)
2.                    Only text is viewed in shell account. (T)
3.                    To view graphic and text shell account is used.(F)
4.                    Dial up connection can be set with a modem. (T) 
5.                    To login into a remote site gopher is used. (F)
6.                    Chatting is online sending and receiving of short text messages. (T) 
7.                    IRC mean Internet Relay Chat. (T)
8.                    Hyper link is a process of linking to another page. (T)
9.                    IP address of 32 bit address. (T)
10.                 A collection of web page is a web site. (T)
11.                  ISP stands for Internet Solution Provider. (F)
12.                 A blog is website for posting articles and comments. (T)
13.                 A search engine searches another search engine. (F)
14.         OR Boolean search retrieve documents that include results that contain either of search. (T)
15.         AND Boolean search excludes the search result. (F)
16.         NOT Boolean search that includes results containing both the search. (F)
17.         Apache is a web server for UNIX platform. (T)
18.         IIS is a web server for windows. (T)
19.         POP and SMTP are email protocol. (T)
20.        FTP protocol is related with transmission of data. (F)
21.         CC stand for Copy Content in email. (F) 
22.        VSNL and Satyam online are example of ISP. (T)
23.        URL is a unique address to any source of information. (T)
24.        Uploading and Downloading a file is done by TCP/IP protocol. (F)
25.        Google.com is dedicated search engine. (T)
26.        .org is used for organizational sites. (T)
27.        Web browser is client software to view web pages. (T)
28.        WWW is tool for hyper text and hyper media. (T)
29.        Client machine is a backend program. (F)
30.        Server responses to the clients request. (T)
31.         Client machine is also called host. (F)
32.        Server machine is also called as terminal/node. (F)
33.        News group is associated with bulletins. (T)
34.        Analog signals are converted to digital and vice-versa with modem. (T)
35.        The computer on the internet know each other through the Domain Name Server(DNS). (T)
36.        Secure Electronic Transaction (SET) protocol is a security measure for Credit card Transaction on internet. (T)   
37.        SSL stands for Secure Socket Layer. (T)  
38.        Search Engines are Websites, which helps you to search text on entire Internet and displays names of all the sites. (T)  
39.        The opening page of the website is called Home Page. (T)  
40.        Internet Explorer is an internet browser. (T)  
41.         ISDN lines are faster than TCP/IP lines. (T)  
42.        HTML is a language used to create web-sites. (T)  
43.        Mozilla Firefox is default browser for windows. (F)
44.        BCC and CC are parts of an email. (T)  
45.        http protocol is used for websites with graphics and video. (T)  
46.        http stands hypertext transfer protocol. (T)  
47.        Email with attachment requires virus scan. (T)  
48.        A search using more than one search term such as Author, Title, ate of publication, keyword, subject.(T)  
49.        Boolean searches allow you to combine words and phrases. (T)  
50.        Distributed processing refers to any of a variety of computer systems that use more than one computer, or processor, to run an application. (T)  


read more "Tybcom Computer Objective (Internet Objective)"

Tybcom Computer Objective (Networking Objective)


NETWORKING

1.             Client is the machine/computer that asks for service and accesses the resources available on the server. (T)
2.            Server responds to the request and sends the requested data back to the client. (T)
3.            Computer that acts as server and client is called a server. (F)
4.            No any dedicated server is used in peer to peer network. (T)
5.            Connection of two computers allows sharing of data. (T)
6.            Peer to Peer network Is also called as point to point network.(T)
7.            Server base network are affordable for small network.(F)
8.            In Peer to Peer network dedicated server is used.(F)
9.            A computer that act as server and client is a peer.(T)
10.         LAN network is fully duplex network.(T)
11.          Cable TV are local telephone system are the examples of MAN.(T)
12.         Example of WAN is Internet.(T)
13.         LAN network is distributed to larger geographical area.(F)
14.         Satellite is used in WAN network.(T)
15.         Ring Topology is easy to administer and trouble shouting.(F)     
16.         Token ring passing method is used in star topology.(F)
17.         Failure of a center unit affects the complete network in star topology.(T)
18.         A common line of transmission is used in star topology. (F)
19.         Computers are connected by T connectors in Bus Topology.(T)
20.        Bus topology is very simple and reliable topology. (T)
21.         The layout or schema of computer is called as topology.(T)
22.        Microwaves  is an example of wired transmission media.(F)
23.        Twisted pair cable are wired transmission media. (T)
24.        Twisted wire pair cable are affected by noise and atmosphere.(T)
25.        Light is used to transit data in coaxial cable.(F)
26.        The data transmission of optical fiber starts from the range of 1 to 2Gbps.(T)
27.        Data signal flow to air in unbounded media.(T)
28.        A hub is a facility to combine all connections and transmit to the server.(T)
29.        Passive hubs are more active then active hubs.(F)
30.        Hub is also called a center computer.(T)
31.         Intelligent  hub are active hubs with added features.(T)
32.        Bridges are mid way between two networks.(T)
33.        Routers are totally different from bridges.(F)
34.        Switches create temporary links between two computers and send data along the link. (T)
35.        TCP protocol determines the address of the destination machine.(F)
36.        IP protocol determines the address of the destination machine.(T)
37.        There are seven layers in OSI model. (T)
38.        Data link layer is the interface between a computer and actual physical transmission media.(F)
39.        Network layer roots information between computer system.(T)
40.        Common representation of information in OSI model is done by presentation layer. (T)   
41.         File transfer, electronic mail, remote login are provided in application layer.(T)
42.        Text and numbers are represented by matrix of pixel.(F)
43.        Disturbed system is also called as parallel processing system.(T)
44.         Text data is represented by a pattern of bits.(T)
45.        A set of rules and regulation followed during exchange of information is protocol.(T)
46.        Computers are connected through a transmission media.(T)
47.        0 and 1 are Binary Numbers.(T)
48.        Graphic data is represented by patterns of bits and bytes .(F)
49.        Message is broken down into small units called packets. (T)
50.        Sharing of resources is not possible in computer network.(F)
    
read more "Tybcom Computer Objective (Networking Objective)"

Tybcom computer objective (E-Commerce Objective)


E-COMMERCE

1.             E-Commerce stands for electrical commerce. (F)
2.            E-Commerce is trading done on internet. (T)
3.            A lot of time is wasted in E-Commerce. (F)
4.            E-Commerce service is available 24 hours a day. (T)
5.            E-Commerce is not a reliable service. (T)
6.            E-Commerce is very fast compare to traditional commerce. (T)
7.            The scope for traditional commerce is local. (T)
8.            Scope of E-Commerce is local. (F)
9.            We have wide range of selection of product throughout globe in E-Commerce. (T)
10.         Traditional commerce is more reliable than E-Commerce. (T)
11.          In E-Commerce customer go to the shop for shopping. (F)
12.         All cash transaction is done on E-Commerce. (F)
13.         Payment is done by credit card in E-Commerce. (T)
14.         Trading is done globally in E-Commerce. (T)
15.         In E-Commerce there is full guarantee about the quality of the product ordered by you. (F)
16.         In E-Commerce information is transferred electronically from one computer to another. (T)
17.         E- Market, EDI and Internet are parts of E-Commerce.(T)
18.         Marketing is not done in E-Commerce.(F)
19.         Commerce done on net is known as E-Commerce. (T)
20.        Buying and selling of product is done in E-Commerce using internet. (T)
21.         Business done on telephone is called E-Commerce. (F)
22.        The cost of the product or service is high in E-Commerce. (F)
23.        E-Commerce covers a large geographical area for advertising and market the product. (T)
24.        International brands of product can reach your doorstep using E-Commerce. (T)
25.        A wide range of product and service is available in E-Commerce. (T)
26.        User of E-Commerce must be well acquainted with the latest technology. (T)
27.        E-market uses internet for its services. (T)
28.        E-market is same as physical market. (F)
29.        E-market is logical presentation of physical market. (T)
30.        Online auction is E-market. (T)
31.         Advertising, purchasing or selling all done through internet is called Internet commerce. (T)
32.        Transmission of data in pre-defined format is EDI. (T)
33.        Electronic fund transfer is not possible in EDI. (F)
34.        Security is the major drawback of E-commerce(T).
35.        Encryption is a process of converting plain text to cipher text.(T)
36.        Encryption does not support security of data from hackers.(F)
37.        Plain text is converted into random text called cipher text.(T)
38.        Encryption is done with the help of private key by sender.(T)
39.        Digital signature is the identity of a person involved in E-commerce.
40.        Private key is the key of a key pair used to create digital signature.
41.         Online payments can be made through E-commerce. (T)
42.        Electronic trading is of great advantage in today’s competitive world. (T)
43.        E-Commerce is the most secured and private system. (F)
44.        VAN stands for Value Added Network. (T)
45.        Hacking of credit cards and password is possible in E-Commerce. (T)
46.        World wide buyers and sellers come together for transaction on net through E-Market. (F)
47.        Online payment can be done through sending credit card no., posting of cheques or by e-money transfer. (T)
48.        Bazee.com is an example of C2C.
49.        Non-reputability is related to message acknowledgment send to sender.(T)
50.        M-commerce is related to mobile commerce.(T)


read more "Tybcom computer objective (E-Commerce Objective)"

About This Blog

Lorem Ipsum

  © Blogger templates Newspaper III by Ourblogtemplates.com 2008

Back to TOP