Computer Networking Quiz – II 0% 3 Computer Networking Quiz- II This quiz is based on Networking Unit -IIClick here for Notes NameEmail 1 / 25 What is SPAM? Email for learning purpose. Email received from unknown sender. Email received from a known sender. 2 / 25 What is the use of Telnet? It is a tool to direclty access computer in LAN.. It is a tool to access a computer lying near. It is a tool to access a computer lying at far away place. 3 / 25 Full form of TCP/IP is: Transmission Central Protocol/ Internet Protocol Transfer Control Protocol/ Internet Protocol Transmission Control Protocol/ Internet Protocol 4 / 25 Full form of HTTP is: Hypertext Transfer Protocol Hypertext Transferring Protocol Hypertext Transmission Protocol 5 / 25 Which of the following is a limitation of star toplogy? Easy to isolate faulty computer Centralized Control Long cable Length 6 / 25 Full form of FTP is: File Transmission Protocol File Transfer Protocol File Travel Protocol 7 / 25 Full form of GSM is: General System for Mobile Communication Global System for Mobile Communication Global System for Mobile 8 / 25 Which protocol is used for E-mail transfer from one device to another? SMTP FTP HTTP 9 / 25 What is full form WI-MAX World Interoperability for Microwave Access Worldwide Interoperability for Micro Access Worldwide Interoperability for Microwave Access 10 / 25 What is a cookie? Text messages sent to a web server by a web browser They are emails sent by web server to web browser Text messages sent to a web browser by a web server 11 / 25 Which of the following are topologies Tree Ship Bus City 12 / 25 Full form of PPP is: Pointer to Pointer Protocol Pointing Point Protocol Point to Point Protocol 13 / 25 Full form of GPRS is: General Packet Radio Servicing Generated Packet Radio Service General Packet Radio Service 14 / 25 What is WORM? It can replicate itself It can delete files It can format hard disk 15 / 25 What is Trozan Horse? Software that is good for computer Software that looks legitimate but can harm the computer Software that can't harm the computer 16 / 25 Full form of WLL is: Wireless Local Looping Wireless Local Loop Wireless in Local Loop 17 / 25 What is Network Topology? Way to distribute data Way to interconnect mobile devices tructure to organize and interconnect computers on a network 18 / 25 Which of the following are threats caused by VIRUS? Install an updated Anti-Virus Software. It may burn your computer Virus may corrupt file system. It may eat up entire memory hence crashing the system. 19 / 25 Full form of VOIP is Voice Over Internet Protocol Voice On Internet Protocol Voice Internet Protocol 20 / 25 Full form of SMTP is: Simple Mail Transfer Protocol Synchronized Mail Transfer Protocol Simple Mail Transmission Protocol 21 / 25 Full form of POP3 is : Post Outdated Protocol version 3 Pre Office Protocol version 3 Post Office Protocol version 3 22 / 25 Full form of WI FI is Wireless Functionality Wired Fidelity Wireless Fidelity 23 / 25 Which is the most commonly used topology for LAN? Star Bus Graph 24 / 25 What is the use of Firewall? There is no use. Allows unauthorized access to the network. Prevent unauthorized access to the network. 25 / 25 Which of the following is an advantage of Bus topology? short cable length Easy to find faults Centralized Control Your score isThe average score is 80% LinkedIn Facebook Twitter VKontakte 0% Restart quiz Exit Spread the love Lesson tags: class 12 computer size quiz, quiz for class xii computer science Computer Networking Quiz - I Computer Networking Quiz - III Back to: CBSE class 12 Computer Science notesSpread the love