Computer Networking Quiz – II 0% 6 Computer Networking Quiz- II This quiz is based on Networking Unit -IIClick here for Notes NameEmail 1 / 25 Which protocol is used for E-mail transfer from one device to another? FTP SMTP HTTP 2 / 25 Which of the following is a limitation of star toplogy? Long cable Length Centralized Control Easy to isolate faulty computer 3 / 25 What is Network Topology? Way to interconnect mobile devices tructure to organize and interconnect computers on a network Way to distribute data 4 / 25 Full form of WI FI is Wired Fidelity Wireless Functionality Wireless Fidelity 5 / 25 Which of the following are threats caused by VIRUS? Virus may corrupt file system. It may eat up entire memory hence crashing the system. It may burn your computer Install an updated Anti-Virus Software. 6 / 25 What is WORM? It can delete files It can format hard disk It can replicate itself 7 / 25 Full form of GSM is: General System for Mobile Communication Global System for Mobile Communication Global System for Mobile 8 / 25 Which of the following is an advantage of Bus topology? Easy to find faults short cable length Centralized Control 9 / 25 Which is the most commonly used topology for LAN? Star Graph Bus 10 / 25 What is SPAM? Email for learning purpose. Email received from a known sender. Email received from unknown sender. 11 / 25 What is the use of Firewall? Prevent unauthorized access to the network. Allows unauthorized access to the network. There is no use. 12 / 25 What is a cookie? Text messages sent to a web browser by a web server Text messages sent to a web server by a web browser They are emails sent by web server to web browser 13 / 25 Full form of HTTP is: Hypertext Transfer Protocol Hypertext Transferring Protocol Hypertext Transmission Protocol 14 / 25 Which of the following are topologies Ship Tree Bus City 15 / 25 Full form of FTP is: File Transmission Protocol File Transfer Protocol File Travel Protocol 16 / 25 What is Trozan Horse? Software that can't harm the computer Software that looks legitimate but can harm the computer Software that is good for computer 17 / 25 Full form of GPRS is: Generated Packet Radio Service General Packet Radio Servicing General Packet Radio Service 18 / 25 Full form of POP3 is : Post Office Protocol version 3 Post Outdated Protocol version 3 Pre Office Protocol version 3 19 / 25 Full form of VOIP is Voice Over Internet Protocol Voice On Internet Protocol Voice Internet Protocol 20 / 25 What is the use of Telnet? It is a tool to direclty access computer in LAN.. It is a tool to access a computer lying near. It is a tool to access a computer lying at far away place. 21 / 25 What is full form WI-MAX World Interoperability for Microwave Access Worldwide Interoperability for Microwave Access Worldwide Interoperability for Micro Access 22 / 25 Full form of PPP is: Point to Point Protocol Pointing Point Protocol Pointer to Pointer Protocol 23 / 25 Full form of TCP/IP is: Transmission Control Protocol/ Internet Protocol Transmission Central Protocol/ Internet Protocol Transfer Control Protocol/ Internet Protocol 24 / 25 Full form of SMTP is: Simple Mail Transfer Protocol Simple Mail Transmission Protocol Synchronized Mail Transfer Protocol 25 / 25 Full form of WLL is: Wireless in Local Loop Wireless Local Looping Wireless Local Loop Your score is The average score is 58% LinkedIn Facebook Twitter VKontakte 0% Restart quiz Exit Spread the love Lesson tags: class 12 computer size quiz, quiz for class xii computer science Computer Networking Quiz - I Computer Networking Quiz - III Back to: CBSE class 12 Computer Science notesSpread the love