1. The scrambling of code is known as_____.
A. encryption
B. a firewall
C. scrambling
D. password-proofing
E. None of these
2. _______ may be included in other folder while making hierarchical structure folder
A. Mini folder
B. Tiered folder
C. Sub-folder
D. Object
E. None of these
3. File extension is used ____.
A. for naming the file.
B. to ascertain that file name is not lost
C. to identify file
D. to identify file type
E. to make items complex
4. ISDN stands for ____.
A. Integral Service Dynamic Network
B. International Subscriber Dialup Network
C. International Service Digital Network
D. Integrated Services Digital Network
E. None of these
5. Which protocol does Ping use?
A. TCP
B. ARP
C. ICMP
D. BootP
E. None of these
Answers and Explanations
1. Answer - Option A
Explanation -
The scrambling of code is known as encryption. It is the process of converting information or data into a code, especially to prevent unauthorized access.
2. Answer - Option C
Explanation -
A folder which is contained in another folder is called a sub-folder.
3. Answer - Option D
Explanation -
File extension is used to identify file type, often separated from the base filename (by, e.g., a dot, a space), that indicates, e.g., the encoding (file format), the usage, of a computer file.
4. Answer - Option D
Explanation -
ISDN stands for Integrated Services Digital Network. It is a design for a completely digital telephone/telecommunications network. It is designed to carry voice, data, images, video, everything you could ever need.
5. Answer - Option C
Explanation -
Ping operates by sending Internet Control Message Protocol (ICMP) echo request packets to the target host and waiting for an ICMP echo reply.
Note:- Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer and back.