Computer Knowledge 1.....................

1. What is Internet 2? 
a. A new type of cabling system for Wide Area Networks 
b. A second local area network that can connect with another on-line LAN to share access 
c. A new standard for Internet browsers 
d. An association to develop advanced Internet technology . 
e. None of these 4
2. The tenn "hypertext" means 
a. Non-sequential writing 
b. Hypermedia 
c. B linking text 
d. Text with heavy formatting 
e. None of these 2
3. While searching a website, you have been unable to find information that was on the site 
several months ago. What might you do to attempt to locate that information? 
a. Visit Google's cached page to view the older copy. 
b. Forget about it, as there is no way to find this information, 
c. Visit a partner site of the organization to see if it is there. 
d. Use the wayback machine. 
e. None of these 3
4. Which kind of lock includes a keypad that can be used to control access into areas? . 
I) Cipher 2) Warded 3)RAD 
4) Tumbler 5) Typelock 4
5. A ………….,sometimes called a boot sector virus, executes when a computer boots up 
because it resides in the boot sector of a floppy disk or the master boot record of a hard disk. 
1) system virus 2) trojan horse virus 3) file virus 4) macro virus 5) None of these 1
6. All the information collected during database development is 
stored in a .......
. 1) repository 2) data warehouse 3) Device 
4) CASE 5) None of these 2
7. The component is used by the data analyst to create the queries that access the database. 
I) data extraction 2) end-user query tool 3. end-user presentation tool 4. data store 5) None of these 2
8. A(n)…………allows network users to share a single copy of software, which resides on the network server. 
I) single-user licence agreement 
2) network site licence- 
3) end-user licence agreement 
4) business software licence 
5) None of these 2
9. A polymorphic virus 
1) modifies its program code each time it attaches itself to another program or file 
2) is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains 
3) a malicious-logic program that hides within or looks like a legitimate program 
4) infects a program file, but still reports the size and creation date of the original, uninfected program 
None of these 1
10. Microwave transmission is used in environments where installing physical transmission media is 
1) difficult or impossible and where line-of-sight transmission is unavailable 
2) easy or promising and where line-of-sight transmission is unavailable 
3) difficult or impossible and where line-of-sight transmission is available . 
4) easy or promising and where line-of-sight transmission is available 
5) None of these 4
11. Which is NOT a good Web security strategy? 
1) Restrict access to the Web server; keep a minimum number of ports open 
2) Limit the users who can load software, edit or add files 
3) Add demo programs so users can test •system without accessing production data 
4) Remove unnecessary compilers and interpreters 
5) None of these 4
12. The altering or data so that it is not usable unless the . changes are undone is 
1) Biometrics 2) Compression 3) Encryption 
4) Ergonomics 5) None of these 3
13. The word FTP stands for 
1) File Translate Protocol 2) File Transit Protocol 
3) File Typing Protocol 4) File Transfer Protocol 
5) None of these 1
14. Voice mail . 
I) is the exchange oftext messages and computer files transmitted via a communications network such as a local area network or the Internet 
2) permits users to converse in real time with each other via the computer while connected to the Internet 
3) functions much like an answering machine, allowing callers to leave a voice message for the called party 
4) involves using video and computer technology to conduct a meeting between participants at geographically separate locations 
5) None of these 3
15. A communication processor that connects dissimilar networks by.providing the translation from one set of protocol to another is 
l) Bridge 2) Gateway 3) Router 
4) Modem 5)All of these 2
16. The time it takes a device-to locate data and instructions and make them available to CPU is known as 
1) clock speed 2) a processing cycle 
3) CPU speed 4) access time 5) None of these 4
17. controls the way in which the computer system functions and provides a means by which users can interact with the computer. 
1) The platform .2) The operating system 
3) Application software 4) The motherboard 
5) None of these 2
19. A(n) is private corporate network; used  exclusively by company employees. 
I) Internet 2) local area network 3) peer-to-peer 
4) intranet 5) None of these 2 . 
20. A characteristic of a file server is which ofthe following? 
1) Manages file operations and is shared on a network 
2) Manages file operations and is limited to one PC 
3) Acts as fat client and is shared on a network 
4) Acts as fat client and is limited to one PC 
5) None of these 1
21. How is power supplied to a low-power USB device? 
1) Through a power cable 
2) From an external power supply 
3) Directly from the computer's power supply 
4) Through the USB cable 
5) None of these 4
22. All of the following are basic principles of networks, except 
'1) each computer must have a network card 
2) there must be communications media connecting the network hardware devices 
3) there must be at Ieast one connecting device 
4) each computer must have software that supports the movement of information 
5) None of these 2
23. The data mining technique derives rules from 
real-world case examples. 1) Rule discover 
3) Neural nets 
5)•None of these 3
24. . are used to identify a user who returns to a 
Website. 
1) Cookies 2) Plug-ins 
4)ASPs 5) None of these 1
25. Graphical diagrams used to represent different multiple perspectives of a system include 
I) use-case, class and state diagrams 
2) state, interaction derivative diagrams 
3) interaction, relationship and class diagrams 
4) deployment, relationship and use-case diagrams 
5) None of these 1
26. Database redesign is not terribly difficult if the I) database is structured
2) database is well-designed 
3) database has no data 
4) database is relatively small 
5) database is relatively large 1
27. Which of the following is normally used to initialize a computer system's hardware? 
I) Bootstrap memory 2) Volatile memory 
3) External mass memory 4) Static memory 5) Random access memory 5
28. When you are selecting a mouse for a particular computer . system, what is the most important consideration? 
I) The type of drivers that come with the mouse 
2) The length of the mouse cord 
3) The type of connector the mouse is equipped with 
4) The number of buttons the mouse has 
5) None of these 3
29. If you wanted to locate the hardware address of a local device, which protocol would you use? 
1) ARP 2) RARP 3) ICMP 4) PING 5) PONG 1
30. A passive threat to computer security is 
I) Malicious Intent 2) Sabotage 
3) Accident Errors 4) Espionage Agents 
5) None of these 1
31. The Secure Electronic Transaction (SET) specification 
I) is a notice, issued and verified by a certificate authority, that guarantees a user or Web site is legitimate 
2) provides private-key encryption of all data that passes between a client and a server 
3) allows users to choose an encryption scheme for the data that passes between a client and a server 
4) uses a public-key encryption to secure credit-card transaction systems 
5) None of these 4
32. ……..allows wireless mobile devices to access the 
Internet and its services such as the Web and e-mail 
I) TCPIIP 2) Ethernet 3)WAP 
4) Token ring 5) None of these 3
33. A 'DOS' floppy disk does not have 
I) a Boot Record 2) a File Allocation Table 
3) a Root Directory 4) virtual Memory 
5)BIOS 4
34. 'MICR' technology used for clearance of cheques by banks refers to 
I) Magnetic Ink Charac}er Recognition 
2) Magnetic Intelligence Character Recognition 
3) Magnetic Information Cable Recognition 
4) Magnetic Insurance Cases Recognition 
5) None of these 1
35. What is software? 
1) A type of computer code 
2) A computer language 
3) A set of instructions for your computer 
4) A cover for the computer 
5) None of these 3
36. A repair for a known software bug, usually available at no charge on the internet, is called a(n) 
, 1) version 2) Patch 3) Tutorial 
4) FAQ 5) None of these 1
37. In the URLhttp://www.prenhall.com. the portion labelled http is the 
I) host 2) domain name 3) protocol 
4) top-level domain 5) None of these . 3
38. The main memory of a computer must be large enough 
to contain the active parts of _ 
1) the operating system 
2) the applications 
3) input/output storage & working storage 
4) All of these 
5) None of these 2
39. The ability to easily add additional users means that a network is 
I) scalable . 2) dedicated 3) decentralised 
4) secure 5) None of these 1
40. In a database, a field is a 
1) lable 2) table ofinfonnation 
3) group of related records 4) category of information 5) None of these 3
41. The number of pixels displayed on a screen is known as 
the screen - . 
1) resolution 2) colour depth 3) refresh rate 
4) viewing size 5) None of these 1
42. Word processing, spreadsheet, and phoyt-editing are example of 
1) application software 
2) system software 
3) operating system software
4) platform software 
5) None of these 1
43. If you wish to extend the length of the network without having the signal degrade, you would use a. 
I) repeater 2) router 
4) switch 5) None ofthese 1
44. A is approximately a million bytes. 
I) gigabyte 2) kilobyte 3) megabyte 
4) terabyte 5) None of these 3
45. . Which of the following is a general-purpose programming language designed by Sun Microsystems and well suited for use on the Web? 
1) VB Script 2) Java Script 3) CSS 
4) Java 5) None of these 2
46. This ……..tier processes HTTP protocol, scripting 
tasks, performs calculations, and provides access to data. 
I) Client 3) Enterprise server 5) None of these 1
47. RSAis 
I) Symmetric Cryptosystem 
2) Asymmetric Cryptosystem 
3) Block Cypher• 
4) Digital Signature 
5) None of these 4
48. What is a benefit of networking your computer with other computers? 
1) Increase in the computer's speed 
2) Sharing of cables to cut down on expenses and clutter 
3) You have another computer if yours has a breakdown 
4) Increase in the speed of the network 
5) Sharing of resources to cut down on the amount of equipment needed 5
49. : ROM tells the computer to 
1) disconnect the computer 
2) start up the operating system 
3) connect to the hardware 
4) turn on 
5) pass on data to the RAM 2
50. Why is technology an important job skill? 
1) Technology plays an essential role in most workplaces today. 
2) Employers are only looking for people with technology experience. 
3) Without technology skills you cannot use a job¬search Web site. 
4) Employers are looking for people to use Microsoft Office. 
5) It is in vogue. 1

Comments

Popular posts from this blog

NITI AYOG......................

Coding and Decoding ...........[competitive. exam prep.... topic 20]

LANGUAGES IN INDIA .............................