Thursday 3 December 2020

General Computer Test - 5

 

1. In the right setting a thief will steal your information by simply watching what you type.

(a)    snagging

(b)    spying

(c)     social engineering

(d)    shoulder surfing

(e)    None of these

Ans : (d)

2. A………..is a small program embedded inside of a GIF image.

(a)    web bug

(b)    cookie

(c)     spyware application

(d)    spam

(e)    None of these

Ans : (a)

3. A hacker contacts you my phone or email and attempts to acquire your password

(a)    spoofing

(b)    phishing

(c)     spamming

(d)    bugging

(e)    None of these

Ans : (b)

4. A hacker that changes or forges information in an electronic resource, is engaging in………

(a)    denial of service

(b)    sniffing

(c)     terrorism

(d)    data diddling

(e)    None of these

Ans : (d)

5. Hackers often gain entry to a network be pretending to be at a legitimate computer.

(a)    Spoofing

(b)    forging

(c)     IP spoofing

(d)    ID theft

(e)    None of these

Ans : (c)

6. The………..of a threat measures its potential impact on a system.

(a)    vulnerabilities

(b)    countermeasures

(c)     degree of harm

(d)    susceptibility

(e ) None of these

Ans : (c)

7. The power level drops below 120V.

(a)    brownout

(b)    spike

(c)     blackout

(d)    surge

(e)    None of these

Ans : (b)

8. Which of the following is NOT a Microsoft Internet tool or technology?

(a)    Dreamweaver

(b)    Silverlight

(c)     Internet Explorer

(d)    Expression Web

(e)    None of these

Ans : (a)

9. A protocol used to control the secure sending of data on the internet is :

(a)    SMTP

(b)    HTTPS

(c)     TCP/IP

(d)    HTTP

(e)    None of these

Ans : (b)

10. Programs from the same developer sold bundled together, that provide better integration and share common features, toolbars and menus are known as ………..

(a)    software suites

(b)    integrated software packages

(c)     software processing packages

(d)    personal information managers

(e)    None of these

Ans : (a)

11. ……………terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.

(a)    Data

(b)    Sales

(c)     Query

(d)    Point-of-Sale (POS)

(e)    None of these

Ans : (a)

12. The OSI model is divided into…………processes called layers.

(a)    five

(b)    six

(c)     seven

(d)    eight

(e)    None of these

Ans : (c)

13.………..are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.

(a)    Servers

(b)    Embedded computers

(c)     Robotic computers

(d)    Mainframes

(e)    None of these

Ans : (b)

14. In a ring topology, the computer in possession of the………can transmit data

(a)    packet

(b)    data

(c)     access method

(d)    token

(e)    None of these

Ans : (d)

15. Viruses are often transmitted by a floppy disk left in the floppy drive

(a)    Trojan horse

(b)    Boot sector

(c)     Script

(d)    Logic bomb

(e)    None of these

Ans : (b)

16. A database management system (DBMS) is a………..

(a)    hardware system used to create, maintain and provide controlled access to a database

(b)    hardware system used to create, maintain, and provide uncontrolled access to a database.

(c)     software system used to create, maintain, and provide uncontrolled access to a database.

(d)    software system used to create, maintain, and provide controlled access to a database.

(e)    None of these

Ans : (d)

17. A Proxy server is used for which of the following?

(a)    To provide security against unauthorized users

(b)    To process client requests for web pages

(c)     To process client requests for database access

(d)    To provide TCP/IP

(e)    None of these

Ans : (b)

18. ……….are words that a programming language has set aside for its own use.

(a)    Control words

(b)    Reserved words

(c)     Control structures

(d)    Reserved keys

(e)    None of these

Ans : (b)

19. What is the primary difference between a virus and a worm?

(a)    A worm has the ability to self-propagate from an infected user’s computer to other computers

(b)    A worm is usually written by a cracker : Script bunnies do not have the skills to develop worm program

(c)     A virus is very harmful to the computers it infects; a worm is not a serious a problem

(d)    Anti-virus software is effective in fighting viruses but not worms

(e)    None of these

Ans : (c)

20. describe what is database fields.

(a)    Structures

(b)    Field markers

(c)     Field definition

(d)    Field names

(e)    None of these

Ans : (d)

21. A goal of normalization is to………….

(a)    minimize the number of relationships

(b)    minimize the number of entities

(c)     minimize the number of tables

(d)    minimize the number of redundancy

(e)    None of these

Ans : (d)

22. A(n)………….uses pictures (called icons) and menus displayed on the screen to send commands to the computer system.

(a)    command-based user interface

(b)    GUI

(c)     system utility

(d)    API

(e)    None of these

Ans : (b)

23. Communication using a modulated carrier to apply a data signal to a transmission medium in analog form is

(a)    Local area network

(b)    Modem

(c)     Base band networking

(d)    Broad band networking

(e)    None of these

Ans : (d)

24. ‘ITS’ stands for

(a)    Intelligent Teaching Systems

(b)    International Tutoring Systems

(c)     Intelligent Tutoring Systems

(d)    All of these

(e)    None of these

Ans : (c)

25.  Any piece of equipment forming an interface to a data communication system is

(a)    DTE

(b)    DTA

(c)     CSA

(d)    DCA

(e)    None of these

Ans : (b)

General Computer Test - 4

 

1. What does SDLC mean in Networking protocol?

(a)    Software Data Link Control

(b)    Synchronous Data Link Control

(c)     Software Development Life Cycle

(d)    Synchronous Data Development Cycle

(e)    None of these

Ans : (b)

2. ADCCP means

(a)    Analog Data Code Check Procedure

(b)    Active Database Communication Control Program

(c)     Application Data Cache Call Procedure

(d)    Advanced Data Communication Control Procedure

(e)    None of these

Ans : (d)

3. According to ISO, HDLC means

(a)    High-Level Data Link Control

(b)    High-Level Data Language Control

(c)     Hardware Data Link Control

(d)    High Definition Link Control

(e)    None of these

Ans : (a)

4. …………..act as a central transmitter and receiver in wireless local area network

(a)    Access Nodes

(b)    Access Points

(c)     Access Hubs

(d)    Access Switch

(e)    None of these

Ans : (b)

5. IP address means

(a)    Internet Protocol

(b)    Internal Power

(c)     Intranet Protocol

(d)    Internal Protocol

(e)    None of these

Ans : (a)

6. Which technology is used in a CDROM Drive?

(a)    Mechanical

(b)    Electromechanical

(c)     Optical

(d)    Fiber Optical

(e)    None of these

Ans : (c)

7. Which of the following device can store large amounts of data?

(a)    Floppy Disk

(b)    Hard Disk

(c)     CDROM

(d)    Zip Disk

(e)    None of these

Ans : (b)

8. Which of the following is handy to carry yet can store large amounts of data?

(a)    Floppy Disk

(b)    Hard Disk

(c)     CDROM

(d)    Zip Disk

(e)    None of these

Ans : (d)

9. Data (information) is stored in computers as?

(a)    Files

(b)    Directories

(c)     Floppies

(d)    Maer

(e)    None of these

Ans : (a)

10. IP Addresses has …. bytes

(a)    2

(b)    4

(c)     8

(d)    16

(e)    None of these

Ans : (b)

11. Which of the following statements is/are true?

(a)    Cache Memories are bigger than RAM

(b)    Cache Memories are smaller than RAM

(c)     ROM are faster than RAM

(d)    Information in ROM can be written by users

(e)    None of these

Ans : (b)

12. A server that can perform to other task besides network services is called…………

(a)    Uno server

(b)    Dedicated server

(c)     Committed server

(d)    Service server

(e)    None of these

Ans : (b)

13. Name a network operating system that is specially designed to handle networking functions efficiently.

(a)    Windows Server 2008

(b)    Windows NT

(c)     NOS

(d)    UNIX

(e)    None of these

Ans : (b)

14.MOS stands for?

(a)    Metal Oxide Semiconductor

(b)    Most Often Store

(c)     Method Organised Stack

(d)    Microsoft Office Suite

(e)    None of these

Ans : (a)

15. Which of the following is not a logic gate?

(a)    AND

(b)    NOR

(c)     NAND

(d)    NAT

(e)    None of these

Ans : (d)

16. Which of the following RAM times have to be refreshed often in order to retain its contents?

(a)    SIMM

(b)    DIMM

(c)     SDMM

(d)    Western Digital

(e)    None of these

Ans : (b)

17. Which of the following companies is a leader in manufacture of Hard Disk Drives?

(a)    Samsung

(b)    IBM

(c)     Fujitsu

(d)    Western Digital

(e)    None of these

Ans : (d)

18. Usually, in MSDOS, the primary hard disk drives has the drive letter?

(a)    A

(b)    B

(c)     C

(d)    D

(e)    None of these

Ans : (c)

19. Which of the memories below is often used in a typical computer operation?

(a)    RAM

(b)    ROM

(c)     FDD

(d)    HDD

(e)    None of these

Ans : (a)

20. Which storage device is mounted on ‘reels’?

(a)    Floppy Disk

(b)    Hard Disk

(c)     Magnetic Tapes

(d)    CDROM

(e)    None of these

Ans : (c)

21. MTBF means

(a)    Mean Time Before Failure

(b)    Master Time Buffer Feature

(c)     Most Treated Buffer Time

(d)    Master Test Board Feature

(e)    None of these

Ans : (a)

22. How many write cycles are allowed to a RAM?

(a)    1

(b)    10

(c)     100

(d)    1000

(e)    None of these

Ans : (a)

23. How many write cycles are allowed to a EEPROM?

(a)    1

(b)    10

(c)     100

(d)    1000

(e)    None of these

Ans : (d)

24. The Analytical Engine developed during First Generation of computers used…………as a memory unit

(a)    RAM

(b)    Floppies

(c)     Cards

(d)    Counter Wheels

(e)    None of these

Ans : (d)

25. A ….. is anything that can cause harm.

(a)    vulnerability

(b)    phish

(c)     threat

(d)    spoof

(e)    None of these

Ans : (c)