Q1. Google is - 1 Virus Programme 2 Search - TopicsExpress



          

Q1. Google is - 1 Virus Programme 2 Search Engine 3 Website 4 Hardware Ans: 2 Q2. where are programs and data to be used by the computer available? 1 Output 2 Processing unit 3 Input 4 Storage Ans: 4 Q3. A parallel port is most often used by a - 1 Mouse 2 Monitor 3 Printer 4 External storage device Ans: 3 Q4. Computer follows a simple principle called GIGO which means: 1 Garbage in garbage out 2 Garbage input good output 3 Good input good output 4 Greater instructions greater output Ans: 1 Q5. Arrange the following devices in ascending order of the speed: A. RAM B. Hard disk C. Cache D. Floppy 1 ABDC 2 BDAC 3 DBAC 4 BADC Ans: 3 Q6. What is the commonly used unit for measuring the sped of data transmission? 1 Bits per second 2 Nano seconds 3 Characters per second 4 Mega Hertz Ans: 1 Q7. Which one among the following is not included in the basic functions of operating system? 1 Job Control 2 Job Scheduling 3 Memory Management 4 Data Management Ans: 1 Q8. Blue tooth technology allows - 1 Landline phone to mobile phone communication 2 Signal transmission on mobile phones only 3 Wireless communication between equipments 4 Satellite television communication Ans: 3 Q9. Which of the following statements about the Crime and Criminal Tracking Network System (CCTNS) is/are correct? 1. It will facilitate real time access of classified criminal data to the law enforcement authorities. 2. National Crime Record Bureau is the nodal agency mandated to implement the network in all the states. Select the correct answer using the code given below- 1 1 only 2 2 only 3 Both 1 and 2 4 Neither 1 nor 2 Ans: 1 Q10. One byte consists of 1 four bits 2 one bit 3 ten bit 4 eight bits Ans: 4 Q11. ENIAC was 1 an electronic computer 2 an engine 3 a memory device 4 an electronic calculator Ans: 1 Q12. The operating system called UNIX is typically used for - 1 Desktop computers 2 Laptop computers 3 Supercomputers 4 All of these Ans: 4 Q13. There are several primary categories of procedures. Which of the following is not a primary category of procedures? 1 Testing 2 Backup and recovery 3 Firewall development 4 Design Ans: 3 Q14. All of the logic and mathematical calculations done by the computer happen in/on the - 1 Central processing unit 2 Mother board 3 Memory 4 Central control unit Ans: 1 Q15. The connection between your computer at home and your local ISP is called - 1 The last mile 2 The home Stretch 3 The home page 4 The backbone Ans: 3 Q16. When speaking of computer input and output, input refers to - 1 any data processing that occurs from new data input into the computer 2 data or information that has been entered into the computer 3 the transmission of data that has been input into the computer 4 Both (C) and (D) above. Ans: 4 Q17. Computer software can be defined as-- 1 the computer and its associated equipment 2 the instructions that tell the computer what to do 3 computer components that act to accomplish a goal 4 an interface between the computer and the network Ans: 2 Q18. The main memory of a computer can also be called - 1 Primary storage 2 Internal memory 3 Primary memory 4 All of these Ans: 3 Q19. Which of the following is not a type of computer software which can be thought? 1 Off-the-shelf 2 Tailor-made 3 Custom-developed 4 Off-the-shelf with alterations Ans: 4 Q20. .....are attempts by individuals to obtain confidential information from you by falsifying their identity. 1 Phishing trips 2 Computer viruses 3 Spyware scams 4 Phishing Scams Ans: 4 Q21. The main job of CPU is to - 1 carry out program instructions 2 Store data/information for future use 3 Process data and information 4 Both (A) and (C) Ans: 4 Q22. Which of the following is an example of an optical disk? 1 Magnetic disks 2 Memory disks 3 Data bus disks 4 Digital versatile disks Ans: 4 Q23. Which of the following is an example of storage devices? 1 Magnetic disks 2 Tapes 3 DVDs 4 All of these Ans: 4 Q24. A person who used his or her expertise to gain access to other peoples computers to get information illegally or do damage is a - 1 Hacker 2 Spammer 3 Analyst 4 Programmer Ans: 1 Q25. A popular way to learn about computers without ever going to a classroom is called - 1 i-learning 2 isolated learning 3 e-learning 4 close learning Ans: 3 Q26. Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information - 1 Floppy diskette 2 Hard disk 3 Permanent disk 4 None of these Ans: 2 Q27. A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using - 1 Input automation 2 Item data automation 3 Scanning automation 4 Source data automation Ans: 3 Q28. Main memory works in conjunction with - 1 RAM 2 Special function cards 3 CPU 4 Intel Ans: 3 Q29. The collection of links throughout the Internet creates an interconnected network called the - 1 WWW 2 Web 3 World Wide Web 4 All of the above Ans: 4 Q30. Cache and main memory will lose their contents when the power is off. They are-- 1 Dynamic 2 Faulty 3 Volatile 4 Static Ans: 3 Q31. Vendor-created program modifications are called-- 1 Patches 2 Fixes 3 Holes 4 Overlaps Ans: 2 Q32. Storage media such as a CD read and write information using -- 1 Magnetic strips 2 Magnetic dots 3 A laser beam of red light 4 All of these Ans: 4 Q33. To reload a Web page, press the.... button. 1 Redo 2 Reload 3 Ctrl 4 Refresh Ans: 4 Q34. The.... controls a client computers resources. 1 Application program 2 Instruction set 3 Operating System 4 Server application Ans: 4 Q35. The process of transferring files from a computer on the Internet to your computer is called-- 1 Downloading 2 Uploading 3 FTP 4 JPEG Ans: 1 Q36. Which media have the ability to have data/information stored (written) on them by users more than once? 1 CD-R disks 2 CD-RW disks 3 Zip disks 4 Optical Disks Ans: 2 Q37. What are the four things needed to connect to the Internet? 1 Telephone line, modem, computer, and an ISP 2 Modem, computer, PDA and ISP 3 Telephone line, PDA, modem and computer 4 monitor, keyboard, mouse, modem Ans: 1 Q38. What is e-commerce? 1 Buying and selling products and services over the Internet 2 Buying and selling international goods 3 Buying and selling products and services not found in stores 4 Buying and selling products having to do with computers Ans: 1 Q39. Storage and memory differ with respect to which of the following characteristics? 1 Reliability 2 Speed 3 Price 4 All of these Ans: 4 Q40. The ---- is the term used to describe the window that is currently being used. 1 Web Window 2 Display Area 3 Active Window 4 Monitor Ans: 3 Q41. 1024 bytes equals: 1 1 KB 2 2 MB 3 1 GB 4 1TB Ans: 1 Q42. The term PC-XT refers to 1 Personal Computer External Technology 2 Personal Computer Extended Technology 3 Personal Computer Embedded Technology 4 Personal Computer Expanded Technology Ans: 2 Q43. Most networks employ devices for routing services. Routers work at which of the Following OSI Layers? 1 Transport 2 Network 3 Presentation 4 Session Ans: 2 Q44. Which of the following will help you to improve your LAN security? 1 Change your passwords frequently 2 Install a firewall program 3 Use a proxy 4 All of the above Ans: 3 Q45. Which of the following devices discriminates between multicast and unicast packets? 1 Multicast switch 2 Bicast switch 3 Bicast router 4 Mulicast Router Ans: 4 Q46. Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1 Application layer Firewall 2 Packet Filtering Firewall 3 Router enhanced firewall 4 IP enabled firewall Ans: 2 Q47. Which of the following systems run an application layer firewall using proxy software? 1 Proxy NAT 2 Proxy client 3 Client 32 4 Proxy server Ans: 4 Q48. A packet filtering firewall operates at which of the following OSI layer? 1 At the Application layer 2 At the Transport Layer 3 At the Network Layer 4 Both 2 and 3 Ans: 4 Q49. Which of the following are true about firewalls? 1 Filters network traffic 2 Can be either a hardware or software device 3 Follows a set of rules 4 All the above Ans: 4 Q50. What are some of the benefits of using a firewall for your LAN? 1 Increased access to Instant Messaging 2 Stricter access control to critical resources 3 Greater security to your LAN 4 Both 2 and 3 Ans: 4
Posted on: Thu, 20 Nov 2014 03:47:48 +0000

Trending Topics



Recently Viewed Topics




© 2015