Thursday 3 December 2020

General Computer Test - 7

 

1. Which of the following objects is passed to a JavaBean when one of its properties is set via a JSP action?

(a)    Servlet Request

(b)    Http Servlet Request

(c)     Servlet Response

(d)    Http Servlet Response

(e)    None of these

Ans : (c)

2. Graphical diagrams used to represent different multiple perspectives of a system include_             

(a)    use-case, class, and state diagrams

(b)    state, interaction, derivative diagrams

(c)     interaction, relationship, and class diagrams

(d)    deployment, relationship, and use-case diagrams

(e)    None of these

Ans : (a)

3. Database redesign is not terribly difficult if the          

(a)    database is structured

(b)    database is well-designed

(c)     database has no data

(d)    database is relatively small

(e)    database is relatively large

Ans : (e)

4. Which of the following are normally used to initialize a computer system’s hardware?

(a)    Bootstrap memory

(b)    Volatile memory

(c)     External mass memory

(d)    Static memory

(e)    Random access memory

Ans : (e)

5. If you wanted to locate the hardware address of a local device, which protocol would you use?

(a)    ARP

(b)    RARP

(c)     ICMP

(d)    PING

(e)    PONG

Ans : (a)

6. What is Internet 2?

(a)    A new type of cabling system for Wide Area Networks

(b)    A second local area network that can connect with another online LAN to share access

(c)     A new standard for Internet browsers

(d)    An association to develop advanced Internet technology

(e)    None of these

Ans : (d)

7. While searching a website, you have been unable to find information that was on the site several months ago. What might you do to attempt to locate that information?

(a)    Visit Google’s cached page to view the older copy.

(b)    Forget about it, as there is no way to find this information

(c)     Visit a partner site of the organization to see if it is there.

(d)    Use the wayback machine.

(e)    None of these

Ans : (c)

8. Which kind of lock includes a keypad that can be used to control access into areas?

(a)    Cipher

(b)    Warded

(c)     Device

(d)    Tumbler

(e)    Typelock

Ans : (d)

9. Which is not a factor when categorizing a computer?

(a)    Speed of the output device

(b)    Amount of main memory the CPU can use

(c)     Cost of the system

(d)    Capacity of the hard disk

(e)    Where it was purchased

Ans : (e)

10. Which of the following terms is the most closely related to main memory?

(a)    nonvolatile

(b)    permanent

(c)     control unit

(d)    temporary

(e)    None of these

Ans : (d)

11. Which of the following is not a factor affecting the processing capability or performance of a PC system?

(a)    The clock speed of the microprocessor

(b)    The revolutions per minute of the printer disk

(c)     The primary storage capacity of the processor

(d)    The built-in instruction set available to the microprocessor

(e)    None of these

Ans : (b)

12. What is the standard code the computer industry created to represent characters?

(a)    DASI

(b)    ASSH

(c)     ASCII

(d)    BASCII

(e)    EPROM

Ans : (c)

13. Primary storage is………..as compared to secondary storage :

(a)    Slow and inexpensive

(b)    Fast and inexpensive

(c)     Fast and expensive

(d)    Slow and expensive

(e)    None of these

Ans : (c)

14. Offline device is :

(a)    a device which is not connected to CPU

(b)    a device which is connected to CPU

(c)     a direct access storage device

(d)    an I/O device

(e)    None of these

Ans : (a)

15. The most popular language used with microcomputers and time-shared mini computers, is an easy-to-use high level language :

(a)    COBOL        

(b)    ADA

(c)     PASCAL

(d)    BASIC

(e)    None of these

Ans : (d)

16. Which of the following is a communication network that is devoted to carrying computer information :

(a)    Data Point

(b)    Data Module

(c)     Data network

(d)    Data Pack

(e)    None of these

Ans : (c)

17. A half byte is known as :

(a)    Data

(b)    Bit

(c)     Half byte

(d)    Nibble

(e)    None of these

Ans : (d)

18. With respect to a network interface card the term 10/100 refers to:

(a)    protocol speed

(b)    a fiber speed

(c)     megabits per seconds

(d)    minimum and maximum server speed

(e)    None of these

Ans : (c)

19. A hard disk is divided into tracks which are further subdivided into :

(a)    clusters

(b)    sectors

(c)     vectors

(d)    heads

(e)    None of these

Ans : (b)

20. Which standard govern parallel communications?

(a)    RS232

(b)    RS-232a

(c)     CAT 5

(d)    IEEE 1284

(e)    None of these

Ans : (d)

21. Which peripheral port provides the FASTEST throughput to laser printers?

(a)    RS-232

(b)    SCSI

(c)     Parallel

(d)    Serial

(e)    None of these

Ans : (c)

22. Resistance is measured in?

(a)    Volts

(b)    Amps

(c)     Watts

(d)    Ohms

(e)    None of these

Ans : (d)

23. In Inkjet technology the droplets of ink are deflected by?

(a)    multi directional nozzles

(b)    electronically charged plates

(c)     high pressure plates

(d)    electro static absorbtion

(e)    None of these

Ans : (a)

24. Which provides the fastest access to large video files?

(a)    Optical drives

(b)    IDE hard drives

(c)     SCSI hard drives

(d)    EIDE hard drives

(e)    None of these

Ans : (c)

25. Primary memory stores :

(a)    Data alone

(b)    Programs alone

(c)     Results alone

(d)    All of these

(e)    None of these

General Computer Test - 6

 

1. In the language of the computer profession, one thousand position of main storage is represented with the letter

(a)    K

(b)    L

(c)     M

(d)    C

(e)    None of these

Ans : (a)

2. The control of the jobs running within a system is

(a)    Job monitoring

(b)    Job stream

(c)     Job min

(d)    Job step

(e)    None of these

Ans : (a)

3. The total number of messages handled by a computerized telephone system on a daily basis is an example of :

(a)    Frequency

(b)    Updating

(c)     Volume

(d)    All of these

(e)    None of these

Ans : (d)

4. A device mounted on a communication satellite which receives, amplifies and re- transmits signals from earth station is

(a)    Track

(b)    Transponder

(c)     Transistor

(d)    Terminal

(e)    None of these

Ans : (b)

5. What is the acronym for Single In-Line Memory Module?

(a)    SIMM

(b)    SILMM

(c)     SM

(d)    SMM

(e)    None of these

Ans : (a)

6. Which type of processing that produces output results immediately after input data are entered into a computer system

(a)    Time-sharing

(b)    Interactive

(c)     Batch Processing

(d)    Real-time processing

(e)    None of these

Ans : (b)

7. A computer program that instructs other programs to perform a particular type of operation is

(a)    System software

(b)    Application program

(c)     Compiler

(d)    Interpreter

(e)    None of these

Ans : (a)

8. The provides a path between the CPU and peripheral devices, which are connected via interface cards

(a)    computer

(b)    expansion bus

(c)     memory

(d)    CPU

(e)    None of these

Ans : (b)

9. Programs prepared by an outside supplier & provided to a user in a machine readable form is known as

(a)    Utility program

(b)    Canned program

(c)     Application program

(d)    Application software

(e)    None of these

Ans : (b)

10. Pictures or drawings, typically displayed on a VDU to allow users to select program options is called

(a)    HIPO charts

(b)    Icons

(c)     Graphics

(d)    Network

(e)    None of these

Ans : (b)

11. The pieces of equipment which are attached to the CPU of a computer and which it can access are called

(a)    output devices

(b)    control units

(c)     hardware

(d)    disk drive

(e)    peripherals

Ans : (e)

12. A factor which might cause an individual to consider using a computer in criminal activities is :

(a)    The computer’s access to large sums of money

(b)    The speed with which the crime can be accomplished

(c)     EFTS (Electronic Funds Transfer System)

(d)    All the these

(e)    None of these

Ans : (d)

13. The Secure Electronic Transaction (SET) specification

(a)    is a notice, issued and verified by a certificate authority, that guarantees a user or Web site is legi timate

(b)    provides private-key encryption of all data that passes between a client and a server

(c)     allows users to choose an encryption scheme for the data that passes between a client and a server

(d)    uses a public-key encryption to secure credit-card transaction systems

(e)    None of these

Ans : (d)

14. ‘DOS’ floppy disk does not have      

(a)    A Boot Record

(b)    A File Allocation Table

(c)     A Root Directory

(d)    Virtual Memory

(e)    BIOS

Ans : (e)

15. All the information collected  during database development is stored in a_

(a)    repository

(b)    data warehouse

(c)     RAD

(d)    CASE

(e)    None of these

Ans : (b)

16. The component is used by the data analyst to create the queries that access the database.

(a)    data extraction

(b)    end-user query tool

(c)     end-user presentation tool

(d)    data store

(e)    None of these

Ans : (b)

17. A polymorphic virus

(a)    modifies its program code each time it attaches itself to another program or file

(b)    is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains.

(c)     a malicious-logic program that hides within or looks like a legitimate program

(d)    infects a program file, but still reports the size and creation date of the original uninfected program

(e)    None of these

Ans : (a)

18. Microwave transmission is used in environments where installing physical transmission media is     

(a)    difficult or impossible and where line-of- sight transmission is unavailable

(b)    easy or promising and where line-of-sight transmission is unavailable

(c)     difficult or impossible and where line-of- sight transmission is available

(d)    easy or promising and where line-of-sight transmission is available

(e)    None of these

Ans : (d)

19. Which is NOT a good Web security strategy?

(a)    Restrict access to the Web server; keep a minimum number of ports open

(b)    Limit the users who can load software, edit or add files.

(c)     Add demo programs, so users can test system without accessing production data.

(d)    Remove unnecessary compilers and interpreters

(e)    None of these

Ans : (d)

20. The word FTP stands for

(a)    File Translate Protocol

(b)    File Transit Protocol

(c)     File Typing Protocol

(d)    File Transfer Protocol

(e)    None of these

Ans : (a)

21. This tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data.

(a)    Client

(b)    Applications/Web server

(c)     Enterprise Server

(d)    DBA

(e)    None of these

Ans : (a)

22. RSA is

(a)    Symmetric Cryptosystem

(b)    Asymmetric Cryptosystem

(c)     Block Cypher

(d)    Digital Signature

(e)    None of these

Ans : (d)

23. A DVD-RAM is similar to a…………except it has storage capacities upto 5.2 GB.

(a)    CD-R

(b)    floppy disk

(c)     CD-RW

(d)    hard disk

(e)    None of these

Ans : (c)

24. How is power supplied to a low-power USB device?

(a)    Through a power cable

(b)    From an external power supply

(c)     Directly from the computer’s power supply

(d)    Through the USB cable

(e)    None of these

Ans : (d)

25. The………data mining techniques derives rules from real-world case examples.

(a)    Rule discover

(b)    Signal processing

(c)     Neural nets

(d)    Case-based reasoning

(e)    None of these