Class - 12 CBSE Computer Science — Assertion Reason Type Questions
Computer Networks
Assertion (A): A Repeater is a device that amplifies the network over geographical distance.
Reasoning (R): A Hub is a device which is used to connect more than one device in the network.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
View Answer3 Likes
Computer Networks
Assertion (A): VoIP stands for Voice over Internet Protocol.
Reasoning (R): VolP is a technology that allows us to make voice calls using a broadband connection instead of a regular phone line.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
View Answer3 Likes
Computer Networks
Assertion (A): A protocol defines the set of rules that are applicable for data sharing and communication over a network.
Reasoning (R): Local Area Network (LAN) is an example of protocol.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
View Answer1 Likes
Computer Networks
Assertion (A): A Gateway is a network device that connects dissimilar networks.
Reasoning (R): A Gateway establishes a connection between local network and external network.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
View Answer1 Likes
Computer Networks
Assertion. Protocols IMAP and POP3 are different but generally work together.
Reason. While IMAP is used for receiving email on a server, POP3 is used for retrieving email from the server.
View Answer3 Likes
Computer Networks
Assertion. Internet Protocol allows the voice data transmission along with other data over packet-switched networks.
Reason. VoIP (Voice over Internet Protocol) enables voice communication over the Internet through the compression of voice into the data packets being transmitted.
View Answer1 Likes
Computer Networks
Assertion. Crackers and hackers technically do the same thing.
Reason. Crackers do the hacking with malicious intentions to harm the data or system while hackers do the hacking with good intentions to know more about the system or to safeguard it.
View Answer2 Likes
Computer Networks
Assertion. Viruses, Worms, Trojans, Adware, Spyware are all Malware.
Reason. Malware is a general term to represent data threat Software.
View Answer2 Likes
Computer Networks
Assertion. A useful looking program may damage data.
Reason. Trojan Horses are useful looking programs which create havoc and damage the data stored.
View Answer2 Likes
Computer Networks
Assertion. Spyware are not harmful as they do not damage data.
Reason. Spyware track data about user and sell it to others hampering your data privacy .
View Answer1 Likes
Showing 101 - 110 of 201 Questions