KnowledgeBoat Logo

Class - 12 CBSE Computer Science — Assertion Reason Type Questions

  • Computer Networks

    Assertion (A): A Repeater is a device that amplifies the network over geographical distance.

    Reasoning (R): A Hub is a device which is used to connect more than one device in the network.

    1. Both A and R are true and R is the correct explanation of A.
    2. Both A and R are true but R is not the correct explanation of A.
    3. A is true but R is false.
    4. A is false but R is true.


  • Computer Networks

    Assertion (A): VoIP stands for Voice over Internet Protocol.

    Reasoning (R): VolP is a technology that allows us to make voice calls using a broadband connection instead of a regular phone line.

    1. Both A and R are true and R is the correct explanation of A.
    2. Both A and R are true but R is not the correct explanation of A.
    3. A is true but R is false.
    4. A is false but R is true.


  • Computer Networks

    Assertion (A): A protocol defines the set of rules that are applicable for data sharing and communication over a network.

    Reasoning (R): Local Area Network (LAN) is an example of protocol.

    1. Both A and R are true and R is the correct explanation of A.
    2. Both A and R are true but R is not the correct explanation of A.
    3. A is true but R is false.
    4. A is false but R is true.


  • Computer Networks

    Assertion (A): A Gateway is a network device that connects dissimilar networks.

    Reasoning (R): A Gateway establishes a connection between local network and external network.

    1. Both A and R are true and R is the correct explanation of A.
    2. Both A and R are true but R is not the correct explanation of A.
    3. A is true but R is false.
    4. A is false but R is true.


  • Computer Networks

    Assertion. Protocols IMAP and POP3 are different but generally work together.

    Reason. While IMAP is used for receiving email on a server, POP3 is used for retrieving email from the server.


  • Computer Networks

    Assertion. Internet Protocol allows the voice data transmission along with other data over packet-switched networks.

    Reason. VoIP (Voice over Internet Protocol) enables voice communication over the Internet through the compression of voice into the data packets being transmitted.


  • Computer Networks

    Assertion. Crackers and hackers technically do the same thing.

    Reason. Crackers do the hacking with malicious intentions to harm the data or system while hackers do the hacking with good intentions to know more about the system or to safeguard it.


  • Computer Networks

    Assertion. Viruses, Worms, Trojans, Adware, Spyware are all Malware.

    Reason. Malware is a general term to represent data threat Software.


  • Computer Networks

    Assertion. A useful looking program may damage data.

    Reason. Trojan Horses are useful looking programs which create havoc and damage the data stored.


  • Computer Networks

    Assertion. Spyware are not harmful as they do not damage data.

    Reason. Spyware track data about user and sell it to others hampering your data privacy .


Showing 101 - 110 of 201 Questions