It Questions
It Questions
It Questions
1. A Passive threat to computer security is(1) Malicious Intent (2) Sabotage (3) Accidental Errors (4) Espionage Agents (5) None of these 2. ____ allows wireless mobile devices to accessthe Internet and its services such as the Web and email. (1) TCP/IP (2) Ethernet (3) WAP (4) Token ring (5) None of these 3. DOS floppy disk does not have____. (1) A Boot Record (2) A File Allocation Table (3) A Root Directory (4) Virtual Memory (5) BIOS 4. MICR technology used for clearance of chequesby banks refers to ____. (1) Magnetic Ink CharacterRecognition (2) Magnetic Intelligence CharacterRecognition (3) Magnetic Information CableRecognition (4) Magnetic Insurance CasesRecognition (5) None of these 5. All the information collected during databasedevelopment is stored in a ____. (1) repository (2) data warehouse (3) RAD (4) CASE (5) None of these 6. The ____ component is used by the data analystto create the queries that access the database. (1) data extraction (2) end-user query tool (3) end-user presentation tool (4) data store (5) None of these 7. The altering of data so that it is not usableunless the changes are undone is ____. (1) Biometrics (2) Compression (3) Encryption (4) Ergonomics (5) None of these 8. The word FTP stands for(1) File Transfer Protocol (2) File Transit Protocol (3) File Typing Protocol (4) File Transfer Protocol (5) None of these 9. This ____ tier processes HTTP protocol,scripting tasks, performs calculations, and provides access to data. (1) Client (2) Applications/Web server (3) Enterprise server (4) DBA (5) None of these 10. A DVD-RAM is similar to a ____, except it hasstorage capacities up to 5.2 GB.
(1) CD-R (2) Floppy disk (3) CD-RW (4) Hard disk (5) None of these 11. All of the following are basic principles ofnetworks, except(1) each computer must have a networkcard (2) there must be communicationsmedia connecting the network hardware devices (3) there must be at least oneconnecting device (4) each computer must have softwarethat supports the movement of information (5) None of these 12. ____ are used to identify a user who returns toa Website. (1) Cookies (2) Plug-ins (3) Scripts (4) ASPs (5) None of these 13. If you wanted to locate the hardware address ofa local device, which protocol would you use? (1) ARP (2) RARP (3) ICMP (4) PING (5) PONG 14. The term, hypertext means(1) Non-sequential writing (2) Hypermedia (3) Blinking text (4) Text with heavy formatting (5) None of these 15. Which kind of lock includes a keypad that can beused to control access into areas? (1) Cipher (2) Warded (3) Device (4) Tumbler (5) Type lock 16. What is the name of protocol used in eliminateloops? (1) Switching (2) ISL (3) Frame tagging (4) Spanning Tree Protocol (5) None of these 17. In networking terminology UTP means (1) Unshielded Twisted Pair (2) Ubiquitous Teflon Port (3) Uniformly Terminating Port (4) Unshielded T-Connector (5) None of these 18. In OSI network architecture, the dialoguecontrol and token management are responsibility of(1) Session layer (2) Network layer (3) Transport layer (4) Data link layer (5) None of the above 19. A C data structure called a structure is agroup of items in which each item is identified by its own identifier, each ofwhich is known as a member of a structure. Member is also known as(1) Information (2) Field (3) Record (4) Data type (5) None of these 20. Multithread means(1) Program do more than one thing ata time
(2) More than one program do onething at a time (3) Both are correct (4) Both are incorrect (5) None of these 21. A page fault occurs? (1) when the page is not in thememory (2) when the page is in the memory (3) when the process enters theblocked state (4) when the process is in the readystate (5) None of these 22. Each packet contains the full source anddestination address. This statement indicates which of the following? (1) Virtual Circuit (2) Datagram (3) Data link (4) FDDI (5) None of these 23. Data bus is(1) Unidirectional (2) Bidirectional (3) Both (1) & (2) (4) Multidirectional (5) None of these 24. Which of the following is a type of ISDN(Integrated Service Digital Network)? (1) Narrow bank (2) Broad band (3) Both (1) & (2) (4) Virtual Circuit (5) None of these 25. Which of the following is a browser to view aweb page? (1) Mosaic (2) Netscape (3) Internet Explorer (4) All of the above (5) None of these 26. A graph is a collection of(1) Row and columns (2) Vertices and edges (3) Equations (4) Identity (5) None of these 27. CDMA is used in(1) Wireless and local loop (2) Allocating a wireless channel (3) Both (1) & (2) (4) Local loop (5) None of these 28. Number of arcs incident to a node is called its(1) Level (2) Predecessor (3) Degree (4) Successor (5) None of these 29. OSPF means(1) Open shortest path finiteprotocol (2) Open shortest path finiteprotocol (3) Open slotted path finite protocol (4) Open slotted path first protocol (5) None of these 30. Binding the same name to multiple operationswhose signatures differ in number or types of arguments?
(1) Overloading (2) Origin class (3) Object model (4) Package (5) None of these 31. What is the name of the chip which has more thanone processor on it? (1) Parallel chip (2) Multi-processor chip (3) Transputer (4) Parallel processor (5) None of these 32. In windows(1) Docking views may be docked (2) Docking views may be float (3) Docking views may be docked orfloat (4) All of the above (4) None of these 33. ____ performs relocations function? (1) Absolute loader (2) Direct linking loader (3) Relocating loader (4) Linkage editor (5) None of these 34. A central computer surrounded by one or moresatellite computers is called a(1) Bus network (2) Ring network (3) Star network (4) All of the above (5) None of these 35. Segmentation (1) is a memory management schemethat supports user view of memory (2) logical address space iscollection of segments (3) logical address consists of twotuple < segment-number, offset>. (4) All of the above (5) None of these 36. Which of the following is a major component ofthe telephone system? (1) Local loop (2) Trunks (3) Switching office (4) All of these (5) None of these 37. Function is invoked by(1) Function (2) Declaration (3) Definition (4) Prototype (5) None of these 38. The ACCEPT command in SQL? (1) Creates a customized prompt whenaccepting user input (2) Explicitly defines a NUMBER orDATE data type variable (3) Hides user input for securityreasons (4) All of the above (5) None of these 39. How many fields are required to represent aheader node of a graph? (1) 3 (2)2 (3) 4 (4)5 (5) None of these 40. Which of the following is not used as a datastructure? (1) Array (2) Linked list (3) Graph (4) Directory (5) None of these
41. Which of the following is an operating systemcall? (1) CREATE (2) LINK (3) SYSTEM (4) All of these (5) None of these 42. In C++, by default, the members of a class are(1) Public (2) Private (3) Both public and private (4) Only Public (5) None of these 43. In core banking systems: (1) Store and forward of transactionis done (2) Branch server is not required (3) Local database is not required (4) Transaction cannot happen from anon-home branch (5) None of these 44. MV command in Unix changes(1) Only the directory (2) Only the directory entry andi-node (3) Only the i-node number (4) All of the above (5) None of these 45. E-Commerce refers to(1) Electrical commerce (2) Electronic commerce (3) Evolutionary commerce (4) Effective commerce (5) None of these 46. Graphs can be implemented using(i) Arrays (ii) Linked list (iii)Stack (iv) Queue (1) (i), (ii) and (iv) (2) (i), (ii) and (iii) (3) (ii) and (iii) (4) (i) and (iv) (5) None of these 47. Thrashing(1) Always occur on large computers (2) is a natural consequence ofvirtual memory systems (3) Can always be avoided by swapping (4) Can be caused by poor pagingalgorithm (5) None of these 48. The process of converting analog signals intodigital signals so they can be processed by a receiving computer is referredas(1) modulation (2) demodulation (3) synchronizing (4) digitizing (5) None of these 49. The relational database environment has all ofthe following components except(1) Users (2) Separate files (3) Database (4) Database administrator (5) None of these 50. Primary key(1) Denote a candidate key that ischosen by the database designer as the principal means of identifying entitieswith in an entity set (2) Attributes names of all primarykey are unique
(3) Primary key specification isoptional and good idea to specify primary key for each relation (4) All of the above (5) None of these Answers:
1 2 3 4 5 6 7 8 9
...
1 3 5 1 1 2 3 4 2
11 12 13 14 15 16 17 18 19
4 1 1 2 1 4 3 1 2
21 22 23 24 25 26 27 28
1 2 2 3 4 2 3 3
31 32 33 34 35 36 37 38
3 2 3 3 4 4 1 4
41 42 43 44 45 46 47 48
4 2 1 1 2 4 4 4