Information Technology MCQ Quiz - Objective Question with Answer for Information Technology - Download Free PDF

Last updated on Jun 5, 2025

Latest Information Technology MCQ Objective Questions

Information Technology Question 1:

Which of the following are the parts of a URL (Universal Resource Locator)?

(a) Protocol.

(b) Media Access Control.

(c) Domain name.

(d) Path.

  1. (a), (b) and (c) are correct 
  2. (b), (c) and (d) are correct
  3. (a), (c) and (d) are correct
  4. (b) and (c) are correct 
  5. None of the above

Answer (Detailed Solution Below)

Option 3 : (a), (c) and (d) are correct

Information Technology Question 1 Detailed Solution

The Correct answer is (a), (c), and (d) are correct

Key Points

  • A URL, which stands for Uniform Resource Locator, serves as a distinctive identifier for locating resources on the Internet, commonly known as a web address.
  • Comprising various components such as a protocol and domain name, a URL guides a web browser on how and where to fetch a particular resource.
  • A URL, comprises several elements:
    • Protocol: The protocol (https) signifies the method for accessing the internet resource. Various protocols include http, https, ftps, mailto, and file.
    • Host Name or Domain Name: The host name or domain name uniquely identifies the webpage.
    • Port: The port (usually not visible) follows a colon, with port 80 being the default for web servers.
    • Path: The path (search/query) denotes the file or location on the web server.
    • Query: The query (?q=URL) appears in dynamic page URLs, containing parameters separated by ampersands (&).
    • Parameters: Parameters (q=URL) are pieces of information in a query string. 
    • Fragment: The fragment (#history) is an internal page reference pointing to a specific section within the webpage.

Information Technology Question 2:

Which of the following is the functions of Data Link Layer (Layer 2)

(A). Framing

(B). Physical Addressing

(C). Error Detection and Correction

(D). Flow and Access Control

  1. All of these
  2. A, B and C
  3. B, C and D
  4. A, C and D

Answer (Detailed Solution Below)

Option 1 : All of these

Information Technology Question 2 Detailed Solution

The Correct answer is All of these.

Key Points

Data Link Layer (Layer 2):

  • Role: Ensures reliable data transfer between two directly connected nodes over the physical layer. It manages error detection and MAC addressing.
  • Devices: Switch, Bridge
  • Sub-layers:
    • LLC (Logical Link Control)
    • MAC (Media Access Control)
  • Functions:
    • Framing: Divides packets into frames with identifiable boundaries.
    • Physical Addressing: Adds MAC addresses to frame headers.
    • Error Detection and Correction: Detects and retransmits lost or damaged frames.
    • Flow and Access Control: Prevents data loss and manages channel access.

Additional Information

  • OSI divides Telecommunications into Seven Layers:
    • Physical Layer.
    • Data Link Layer.
    • Network Layer.
    • Transport Layer.
    • Session Layer.
    • Presentation Layer.
    • Application Layer.
  • Layer 1: The Physical Layer:
    • The physical layer, the lowest layer of the OSI model, is concerned with the transmission and reception of the unstructured raw bit stream over a physical medium. 
    • It provides: 
      • Data encoding
      • Transmission technique
      • Physical medium transmission.
  • Layer 2: The data-link layer:
    • The data link layer ensures reliable data frame transfer between nodes over the physical layer. 
    • To do this, the data link layer provides: 
      • Frame Traffic Control:
      • Frame Sequencing
      • Frame Acknowledgment
      • Frame Delimiting
      • Link Establishment and Termination
      • Frame Error Checking
  • Layer 3: The Network Layer:
    • The network layer facilitates transferring variable-length data sequences between a source host on one network and a destination host on another network.
    • This layer is concerned with two functions
      • Routing and
      • Fragmentation / Reassembly: 
  •  Layer 4: The Transport Layer:
    • The transport layer enables seamless data transfer between end users, offering dependable services to upper layers.
    • The Basic Transport Layer Services are: 
      • Resource Utilization (multiplexing).
      • Connection Management (establishing & terminating):
      • Flow Control (Buffering / Windowing):
  • Layer 5: The Session Layer:
    • The session layer initiates, oversees, and concludes sessions between applications on various hosts in a network.
    • It is Responsible for dialog control and synchronization
    • Its primary role is to manage service requests and responses between hosts for applications.
    • The established session between hosts can be Simplex, half duplex, or full duplex.
  • Layer 6: The Presentation Layer:
    • The presentation layer transforms data into the form that the application accepts.
    •  This layer is sometimes called the syntax layer or Translation layer.
    • The Presentation Layer is responsible for the following services: 
      • Data representation:
      • Data security:
      • Data compression:
      • Translation:
  • Layer 7: The Application Layer:
    • The application layer is in direct contact with end users and software applications.
    • It interacts with applications that implement communication.
    • It's the top layer, responsible for introducing data into the OSI stack.
    • The Application Layer functions include:
      • Resource sharing and device redirection
      • Remote file and printer access
      • Network management
      • Directory services
      • Electronic messaging (e.g., mail)

F1 Priya Teaching 07 6 24 D11

Information Technology Question 3:

In Terms of ISDN Which type of services Corresponds to Layers 4 to 7 (Transport to Application layers).

  1. Bearer Services
  2. Teleservices
  3. Supplementary Service
  4. All of these

Answer (Detailed Solution Below)

Option 2 : Teleservices

Information Technology Question 3 Detailed Solution

The Correct answer is Teleservices.

Key Points 

  • ISDN Services:
    • The purpose of the ISDN is to provide fully integrated digital services to users.
    • These services fall into categories- bearer services, teleservices, and supplementary services
    • Bearer Services:
      • Bearer services provide the means to transfer information (voice, data, and video) between users without the network manipulating the content of that information.
      • The network does not need to process the information and therefore does not change the content.
      • Bearer services belong to the first three layers of the OSI model and are well-defined in the ISDN standard.
      • They can be provided using circuit-switched, packet-switched, frame-switched, or cell-switched networks (ATM).

F1 Vinanti Teaching 28.11.23 D2

  • Teleservices:
    • In teleservices, the network may change the contents of the data.
    • These services correspond to layers 4-7 of the OSI model.
    • Teleservices relay on the facilities of the bearer services and are designed to accommodate complex user needs, without the user having to be aware of the details of the process. 
    • Teleservices include telephony, teletex, telefax, videotex, telex, and teleconferencing. 

F1 Vinanti Teaching 28.11.23 D3

  • Supplementary Service:
    • Supplementary services are those services that provide additional functionality to the bearer services and teleservices.
    • Examples of these services are reverse charging, call waiting, and message handling, all familiar from today's telephone company services

F1 Vinanti Teaching 28.11.23 D4

Additional Information

  • ISDN:
    • Integrated Services Digital Network (ISDN) involves the integration of both circuit-switched and packet-switched networks within public telephone networks (PSTN) and carriers.
    • Various telephone and service equipment can link to the cloud network via public carriers using their respective equipment
    • Analog phones, facsimile machines, modems, and other devices can connect to the nearest Local Exchange Carrier (LEC), which, in turn, is linked to public carriers.
    • The choice of carrier for each transmission is determined by the technologies employed.
    • Circuit-switched networks facilitate analog phone calls, while packet-switched networks handle data transmission over the same carrier channels.
    • This integrated approach allows for diverse communication needs to be met efficiently.
  • ATM:
    • Asynchronous Transfer Mode (ATM) is an ITU standard for high-speed networking, akin to the technologies mentioned earlier, facilitating voice, video, and data communications.
    • Unlike some other technologies, ATM networks are connection-oriented, aiming to enhance utilization and Quality of Service (QoS) in high-traffic networks.
    • Operating at the data link layer (Layer 2 in the OSI model), ATM technology plays a crucial role in optimizing network performance.

 

Information Technology Question 4:

Which of the following provides IaaS ?
(i) Rackspace
(ii) Duraspace
(iii) Liblime
(iv) Amazon Web Service
Codes :

  1. (i) and (ii) are correct
  2. (i) and (iv) are correct
  3. (iii) and (iv) are correct
  4. (ii) and (iv) are correct

Answer (Detailed Solution Below)

Option 2 : (i) and (iv) are correct

Information Technology Question 4 Detailed Solution

The Correct answer is (i) and (iv) are correct

Key Points

  • ​IaaS is a cloud computing model that provides virtualized computing resources over the internet such as servers, storage, and networking.
  • Users can rent infrastructure on demand instead of buying and maintaining physical hardware.
  • Rackspace is a cloud computing company that provides IaaS solutions, including managed servers, storage, and networking.
    • It allows users to deploy virtual servers and cloud infrastructure.
  • AWS is one of the leading IaaS providers globally.
    • Services like Amazon EC2 (Elastic Compute Cloud) offer on-demand computing infrastructure.

Additional Information

  • Duraspace:
    • DuraSpace is not an IaaS provider. It focuses on open-source repository platforms like DSpace and Fedora for digital preservation and data management.
    • It is relevant to digital libraries, not cloud infrastructure.
  • Liblime:
    • Liblime offers library automation solutions, particularly Koha (an open-source ILS).
    • It does not provide IaaS infrastructure services.

Software as a Service (SaaS)-

  • It is a software licensing and delivery model in which software is licensed on a subscription basis and is hosted centrally.
  • It is also known as "on-demand software" and Web-based/Web-hosted software.
  • It includes the services such as - GoogleDoc, GoogleApps, OpenID, Adobe

Platform as a Service (PaaS)-

  • It is a category of cloud computing services that allows customers to instantiate, run, and manage a modular bundle comprising a computing platform and one or more applications.
  • It removes the complexity of building and maintaining the infrastructure typically associated with developing and launching the application(s)
  • It allows developers to create, develop, and package such software bundles.
  • It includes Cloud Services such as - LibLime, OSSLab, N-LARN project in India, Polaris, and Exlibris.

Infrastructure as a Service (IaaS)-

  • ​It is a cloud computing service model by means of which computing resources are supplied by a cloud services provider.
  • This service enables users to free themselves from maintaining an on-premise data center.
  • IaaS involves the use of a cloud orchestration technology like OpenStack, Apache CloudStack, or OpenNebula. 
  • It includes the services such as - Amason Elastic Compute Cloud (EC2), Amazon Simple Storage Solution (S3), and Dropbox Cloud storage.

Information Technology Question 5:

............. and ............. are syntaxes for pointing to parts of an XML document.
(i) X pointer
(ii) X link
(iii) X fragments
(iv) CSS
codes:

  1. (i) and (ii) are correct
  2. (ii) and (iv) are correct
  3. (i) and (iii) are correct
  4. (ii) and (iii) are correct

Answer (Detailed Solution Below)

Option 3 : (i) and (iii) are correct

Information Technology Question 5 Detailed Solution

The Correct answer is (i) and (iii) are correct.

Key Points

  • XPointer (XML Pointer Language):
    • A syntax designed to point to specific parts within an XML document.
    • Unlike a regular URL that links to a whole document, an XPointer allows you to go deeper and pinpoint a specific element, attribute, or section inside an XML file.
    • XPointer is explicitly a syntax for pointing to parts of XML documents.
  • XFragments:
    • Another syntax is under development for referencing specific parts of XML documents
    • Just like XPointer, XFragments are also meant for pointing inside XML structures.

Additional Information

  • XML stands for eXtensible Markup Language. It is a markup language much like HTML, but it is designed to store, transport, and structure data, not to display it.
  • An XML document has a tree structure and consists of:
    • Elements (tags): Like , <author></li> <li>Attributes: Extra info added to elements: <book genre="fiction"></li> <li>Text content: The actual data (like a book name or price)</li> <li>Hierarchy: Parent and child elements</li> </ul> </li> </ul> <div class="buttons-container"></div> </div> </div><div class="signup-banner"> <div class="sub-heading"> India’s <strong>#1 Learning</strong> Platform </div> <div class="main-heading"> Start Complete Exam Preparation </div><div class="features-container"> <div class="feature"> <div class="feature-icon"><img src="/" alt="Live Masterclass" width="25" height="25"></div> <div class="feature-detail">Daily Live MasterClasses</div> </div> <div class="feature"> <div class="feature-icon"><img src="/" alt="Practice Question Bank" width="25" height="25"></div> <div class="feature-detail">Practice Question Bank</div> </div> <div class="feature"> <div class="feature-icon"><img src="/" alt="Mock Tests & Quizzes" width="25" height="25"></div> <div class="feature-detail">Mock Tests & Quizzes</div> </div> </div><div class="buttons-container pure-u-1 pure-u-md-4-5 pure-u-lg-3-5"> <a target="_blank" class="pure-button pure-button-success" href="/testbookcom/login?tile=signup&headerText=Sign%20Up%20To%20Get%20Free%20Solution%20PDF&utm_source=QuestionBank&utm_medium=QuestionBankRecommendation&referrer=QnA&referrerType=QnA">Get Started for Free</a> <a target="_blank" class=" download-app-btn" href="/"> <svg id="livetype" xmlns="/" width="119.66407" height="40" viewBox="0 0 119.66407 40"> <title>Download_on_the_App_Store_Badge_US-UK_RGB_blk_4SVG_092917 - halleshangoutonline.com
Trusted by 7.2 Crore+ Students

Top Information Technology MCQ Objective Questions

Which of the following is NOT an output device?

  1. Monitor
  2. Touchscreen
  3. Printer
  4. Plotter

Answer (Detailed Solution Below)

Option 2 : Touchscreen

Information Technology Question 6 Detailed Solution

Download Solution PDF

The correct answer is Touchscreen.

Key Points

  • The touchscreen is not an output device.
  • The mobile touchscreens generally contain 2 modules. One is touch and the other is the screen which displays the content on the mobile. So Touch is basically embedded with the sensors and the screen of the device. So in this manner touchscreen combined is an input and output device both.
  • Plotter, printer, and monitor are output devices but a touch screen is not an output device.
  •  An output device is any piece of computer hardware equipment that converts information into human-readable form. 
  •  It can be text, graphics, tactile, audio, and video.
  • Some of the output devices are Visual Display Units i.e. a Monitor, Printer graphic Output devices, Plotters, Speakers.
  • An output device is any hardware device used to send data from a computer to another device or user. 

Additional Information

  • An input device is a piece of equipment used to provide data and control signals to an information processing system such as a computer or information appliance.
    • Examples of input devices include keyboards, mouse, scanners, cameras, joysticks, and microphones. 
  • Language and memory, Data and instructions, Text and graphics, Storage and commandsFeedbackCorrect.
  • These are the two categories of input.
  • Data can be unprocessed text or numbers, images, etc.

An attempt to obtain sensitive information such as username, password and credit card details etc. for malicious reasons, by posing as a trustworthy source in e-mail is called as

  1. Losing
  2. Phishing
  3. Sourcing
  4. Cheating

Answer (Detailed Solution Below)

Option 2 : Phishing

Information Technology Question 7 Detailed Solution

Download Solution PDF

The correct answer is Phishing.

Key Points 

  • Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.
  • The first recorded use of the term "phishing" was in the cracking toolkit AOHell created by Koceilah Rekouche in 1995.
  • Types of phishing:
    • Email phishing
    • Spear pishing
    • Whaling and CEO Fraud
    • Clone phishing
    • Voice phishing
    • SMS phishing
    • Calendar phishing
    • Page hijacking.

What is the essential feature of WORM compared to other optical storage media?

  1. Recording once done is irreversible
  2. Recording can be digital
  3. It comes on a disk
  4. It has higher storage density

Answer (Detailed Solution Below)

Option 1 : Recording once done is irreversible

Information Technology Question 8 Detailed Solution

Download Solution PDF

The correct answer is Recording once done is irreversible:

Key Points

  • In computer media, write once, read many, or WORM, is a data storage technology that allows data to be written to a storage medium a single time and prevents the data from being erased or modified.
  • Storage media that support WORM storage are purposely non-rewritable to prevent anyone from intentionally or accidentally erasing or modifying the data after it is initially stored.
  • WORM media was developed in the late 1970s using optical disks. Over the years, these disks have varied from 5.25 to 14 inches in diameter.
  • The CD-R, DVD-R, and BD-R optical discs for computers are common WORM devices.

Additional Information

  • Optical media refers to any data storage device or equipment that uses optical data storage and retrieval techniques to read and write data.
  • The first recorded historical use of an optical disc was in 1884 when Alexander Graham Bell, Chichester Bell, and Charles Sumner Tainter recorded sound on a glass disc using a beam of light.
  • There are three main types of optical media: CD, DVD, and Blu-ray.

ASCII uses _______ bits to code each character.

  1. 7
  2. 8
  3. 9
  4. 24

Answer (Detailed Solution Below)

Option 1 : 7

Information Technology Question 9 Detailed Solution

Download Solution PDF

The correct answer is 7.

Key PointsASCII

  • ASCII is a 7-bit code.
  • It uses seven bits to represent a letter or a punctuation mark.
  • It stands for American Standard Code for Information Interchange.
  • It is a standard data-encoding format for electronic communication between computers. 
  • ASCII assigns standard numeric values to letters, numerals, punctuation marks, and other characters used in computers.
  • The code was first published as a standard in 1967. 

Linux is an example of:

  1. Multimedia Software
  2. Library Software
  3. System Software
  4. Content Management Software

Answer (Detailed Solution Below)

Option 3 : System Software

Information Technology Question 10 Detailed Solution

Download Solution PDF

The correct answer is "System Software".

Key Points

  • Linux is an open-source Unix-like operating system, Linux is based on the Linux kernel.
  • Linux was developed by Linus Torvalds, and Linux was released in September 1991.
  • Linux was written in C and assembly language

Additional Information

  • Multimedia Software-
    • it is the combination of text, audio, images, animation, or videos to produce interactive content.
    • Examples of Multimedia Software are - VLC Media, KM Player, VidMate, iTunes, Windows Media Player, etc.
  • Library Software- 
    • Software that is designed to manage all the functions of a library is known as Library Software.
    • Examples of Library Software are - CodeAchi, Libero, World Share Management Services, etc.
  • System Software-
    • A System Software is a type of computer program that runs a computer's hardware and application software.
    • It provides a platform for other software.
    • Examples of System Software are - operating systems (OS) like macOS, Linux, Android, Microsoft windows, etc.
  • Content Management Software-
    • Content Management Software enables users to create, edit, collaborate, publish and store digital content.
    • Examples of System Software are - WordPress, Magneto, Jumla, etc.

_______ are classified as white hat or black hat.

  1. Attackers 
  2. Hackers
  3. Spammers 
  4. Phishera

Answer (Detailed Solution Below)

Option 2 : Hackers

Information Technology Question 11 Detailed Solution

Download Solution PDF

The correct answer is Hackers

Key Points

  • A hacker is someone skilled in breaching cybersecurity defenses, and they are often categorized using a 'hat' system in the cybersecurity world.
  • In the realm of cyberspace, there are three primary classifications of individuals:
    • White Hats
    • Grey Hats
    • Black Hats
  • ​White Hat:
    • White hat hackers are individuals or cybersecurity professionals who use their skills and knowledge for ethical and legitimate purposes.
    • They often work to protect computer systems, networks, and software from security vulnerabilities and threats.
  • Black Hat:
    • Black hat hackers are individuals or groups who engage in hacking and cyber-attacks with malicious intent.
    • They often break into computer systems, steal sensitive information, distribute malware, and cause harm to individuals, organizations, or even nations for personal gain, financial profit, or other malicious purposes. Black hat hacking is illegal and unethical.
  • Grey Hat:
    • Grey hat hackers occupy a middle ground between white hats and black hats.
    • Unlike white hats, they typically don't seek permission to hack systems. However, unlike black hats, they refrain from engaging in other illegal activities.

Additional Information

  • Attackers:
    • "Attackers" refers to individuals or entities that carry out malicious actions or activities with the intent to harm, exploit, or compromise computer systems, networks, or data.
  • Spammers:
    • "Spammers" are individuals or entities that engage in the practice of sending unsolicited and often irrelevant or inappropriate messages or content, typically through electronic means such as email, social media, or instant messaging. 
  • Phisher:
    • A "phisher" is an individual or entity that engages in phishing, which is a form of cyber-attack where the attacker attempts to deceive people into divulging sensitive or confidential information, such as login credentials, financial information, or personal details. 

Arrange the following units of storage capacity in increasing order of magnitude:

  1. Megabyte, Kilobyte, Terabyte, Gigabyte
  2. Kilobyte, Terabyte, Gigabyte, Megabyte
  3. Terabyte, Gigabyte, Kilobyte, Megabyte
  4. Kilobyte, Megabyte, Gigabyte, Terabyte

Answer (Detailed Solution Below)

Option 4 : Kilobyte, Megabyte, Gigabyte, Terabyte

Information Technology Question 12 Detailed Solution

Download Solution PDF

The correct answer is "Kilobyte, Megabyte, Gigabyte, Terabyte".

Key Points

Unit Symbol Value
Kilobyte KB 103
Megabyte MB 106
Gigabyte GB 109
Terabyte TB 1012
Petabyte PB 1015
Exabyte EB 1018
Zettabyte ZB 1021
YotTabyte YB 1024

Which of the following types of programming language is Java?

  1. Scripting
  2. Object-oriented
  3. Publishing
  4. Algorithmic

Answer (Detailed Solution Below)

Option 2 : Object-oriented

Information Technology Question 13 Detailed Solution

Download Solution PDF

The Correct answer is Object-oriented:

Key Points

  •  Programming Language:
    • It is a system of Notation for writing a computer program.
    • First GL is also called Machine Language.
    • The second GL is called assembly Language.
    • Third GL is called a High-level programming language.
    • Fourth GL aims for a higher level of abstraction of internal computer hardware details.
    • Fifth GLare is based on problem-solving.
    • FORTRAN was invented in 1954 by John Backus at IBM.
    • C was developed between 1969 and 1973.

Additional Information

  • Java:
    • ​Java was developed by James Gosling in 1995 at sun Microsystem.
    • Greenstone 3 is written in java.
    • AJAX is an acronym for Asynchronous javascript and XML.

What is the application of word processing software?

  1. Collect, search and manipulate unique data
  2. Controls the execution of a computer
  3. Interactive editing of documents
  4. Facilitate writing Programming Code 

Answer (Detailed Solution Below)

Option 3 : Interactive editing of documents

Information Technology Question 14 Detailed Solution

Download Solution PDF

The Correct answer is Interactive editing of documents.

Key Points

  • Word processing software:
    • Word processing software refers to applications designed for the manipulation, editing, and formatting of text, paragraphs, and pages.
    • This term encompasses three main types: electronic, mechanical, and software-based word processors.
    • Word processing software serves the purpose of basic editing and design, allowing users to manipulate text within documents.
    • It includes features for editing, formatting, and designing pages
    • In contrast, a word processor is a device that combines functions such as editing, input, formatting, and text output, often with additional features.
    • Main features and applications of word processing software:
      • Document Creation:
      • Text Editing:
      • Formatting Tools
      • Spell Checking and Grammar Checking
      • Template etc.
    • Examples:
      • Wordpad
      • Microsoft Word
      • Lotus word pro
      • Notepad
      • WordPerfect (Windows only),
      • AppleWorks (Mac only),
      • Work pages
      • OpenOffice Writer

F1 Vinanti Teaching 13.11.23 D1

A device that interconnects two or more networks and selectively interchanges packets of data between them is known as

  1. Switch
  2. Gateway
  3. Hub
  4. Router

Answer (Detailed Solution Below)

Option 4 : Router

Information Technology Question 15 Detailed Solution

Download Solution PDF

The Correct answer is Router.

Key Points

  • Router.
    • A router is an electronic device that interconnects two or more networks, and selectively interchanges packets of data between them.
    • Routers perform traffic-directing functions on the Internet. Data sent through the internet, such as a web page or email, is in the form of data packets.
    • A packet is typically forwarded from one router to another router through the networks that constitute an internetwork until it reaches its destination node.
    • A router is connected to two or more data lines from different IP networks.

Additional Information

  • Switches
    • ​A network switch forwards data packets between devices.
    • Switches are networking devices operating at layer 2 or a data link layer of the OSI model.
    • Switches can be hardware devices that manage physical networks or software-based virtual devices.
  • Hub
    • ​A network hub is a node that broadcasts data to every computer or Ethernet-based device connected to it.
    •  A hub has many ports in it. They are generally used to connect computers in a LAN.
  • Gateway:
    • A gateway is a crucial network node in telecommunications that serves as a bridge between two networks with different transmission protocols. 
    • Gateways are used to connect and facilitate communication between two networks that use different transmission protocols or technologies. 
  • Nibble:
    • In computing, a nibble is a four-bit aggregation or half an octet.
    • It is also known as a half-byte or tetrade.
    • In a networking or telecommunication context, the nibble is often called a semi-octet, quadbit, or quartet.
    • A nibble has sixteen (24possible values.
    • A nibble can be represented by a single hexadecimal digit (0–F) and called a hex digit.
  • ​Cable:
    • Network cabling is the process of connecting devices to an Internet source.
    • Network cables can be divided into four types: coaxial, shielded twisted pair (STP), unshielded twisted pair (UTP), or fibre optic.
Get Free Access Now
Hot Links: teen patti 51 bonus teen patti mastar dhani teen patti teen patti gold online teen patti real cash game