New Activity
Play Quiz
1. 
Transceivers are used in
A.
Ethernet
B.
Internet
C.
Intranet
D.
Can be used anywhere
2. 
A bytes has ___________ bits.
A.
7
B.
8
C.
16
D.
64
3. 
A picture is stored as jpeg because
A.
It is faster to retrieve the images in this format
B.
Image in this format takes less memory space
C.
Image in this format uses better colour scheme
D.
Either (a) or (b)
4. 
An application that maintains a table of domain name and its corresponding IP address to resolve the domain name is called
A.
Domain name system
B.
Domain name resolution
C.
Domain name server
D.
Domain name address
5. 
`.mil' sites refer to
A.
Commercial sites
B.
Military sites
C.
Network sites
D.
Educational sites
6. 
`.net' sites are
A.
Commercial sites
B.
Military sites
C.
Network sites
D.
Educational sites
7. 
Which of the following is NOT an objective of logging with regard to database?
A.
To monitor the performance of the system
B.
To provide a record of transactions
C.
To restore any lost data
D.
Both (a) & (b)
8. 
The end system in an entity based system implies which one of the following?
A.
The workstation and operating system
B.
The Internet
C.
The administrative authority
D.
The network topology
9. 
Why do we need interface with customer?
A.
Interacting with customers to understand the customer, requirements
B.
Data and process asset management
C.
Managing the complex and pervasive information systems
D.
Either (a) or (b)
10. 
Organization would prefer in house development of software to
A.
Ensure that the development adhere to defined quality
B.
Maintain vendor relations
C.
Use the technology that is being widely used " development
D.
Both (a) & (b)
11. 
Security measures are taken
A.
To prevent unauthorized use of information
B.
To ensure legal compliance
C.
To ensure availability of the information
D.
Either (a) or (b)
12. 
To maintain encryption technology, what is required'
A.
Revoking of keys
B.
Destructing of keys
C.
Achieving of keys
D.
Either (a) or (c)
13. 
IMAP allows ______ mode of E-mail access.
A.
Offline
B.
Online
C.
Dial out
D.
Either (b) or (c)
14. 
RAM is a
A.
File
B.
Network
C.
Memory
D.
Disk
15. 
Disadvantage of distributed database is.
A.
Unreliability
B.
Easy implementation
C.
Insecurity
D.
High communication cost
16. 
IO.SYS includes _______.
A.
API & Disk BIOS
B.
BIOS & SYSINT
C.
SYSINT & API
D.
kernel
17. 
Putting data on stack is _____________.
A.
Poping
B.
Pushing
C.
Setting
D.
Both (a) & (b)
18. 
Which of the following is false?
A.
32-bit data bus can work with 16 bit microprocessor
B.
New data cann't be stored in RAM during program execution
C.
Both are true
D.
Both are false
19. 
Odd man out is ___________.
A.
IO.SYS
B.
MSDOS.SYS
C.
ROM.BIOS
D.
COMMAND.COM
20. 
PC/AT has _______
A.
2 FDD
B.
2 HDD
C.
1 FDD & 1 HDD
D.
Both (a) & (b)
21. 
Starting of file in data space is indicated by _____
A.
Starting cluster number
B.
FAT entry of file
C.
Boot parameters of file
D.
Both (a) & (c)
22. 
After retention date of a fife has expired, the file should be___
A.
Purged
B.
Retention date should be extended
C.
Retrieved from back up storage
D.
Encrypted
23. 
Partially equipped cite with few equipments but without main computer is_______
A.
Hot site
B.
Warm site
C.
Cool site
D.
Server
24. 
Desirable feature of modem is
A.
Attenuation and amplification
B.
Dynamic equalization
C.
Automatic dial-up
D.
Either (a) or (b)
25. 
Tests are designed after _________of software specification.
A.
Completion
B.
Each level
C.
Mid way
D.
They are not written at all
26. 
MSAU is ___
A.
TOKEN
B.
Network architecture
C.
Hub
D.
Switch
27. 
Which of them is browser?
A.
IE
B.
Netscape
C.
MOSAIC
D.
Either (a) or (b)
28. 
Which is NOT a feature of www?
A.
Retrieving information
B.
Enabling multimedia
C.
Built in hyper text capability
D.
Both (a) & (b)
29. 
Which of the following is NOT a feature of PC?
A.
Actual Intelligence
B.
Accuracy
C.
Speed
D.
High storage
30. 
A peripheral is ___
A.
Firmware
B.
Sleekware
C.
Hardware
D.
Software
31. 
What is incorrect about software?
A.
It can manipulate computer
B.
It has programs, instructions
C.
It can be changed
D.
It can be touched
32. 
A 32bit microprocessor at a time can mangle _____
A.
32 bits
B.
32 bytes
C.
32 KB
D.
32 MB
33. 
Find the odd man out :
A.
PC
B.
PC/XT
C.
MAC
D.
PC/AT
34. 
Which of them does not display graphics?
A.
MA
B.
CGA
C.
EGA
D.
VGA
35. 
Which of them has graphical user ink or face?
A.
VB
B.
C
C.
C++
D.
Unix
36. 
Data field in DBMS is ____
A.
Software
B.
Attribute
C.
Hardware
D.
Table
37. 
Data field in directory is __________ bytes long.
A.
12
B.
2
C.
8
D.
16
38. 
Which of the following is an application level firewall?
A.
Packet filtering routers
B.
Proxy systems
C.
Stateful inspection
D.
Both (a) & (c)
39. 
What does the restructuring of existing source code in Reverse Engineering?
A.
Abstraction
B.
Completeness
C.
Directionality
D.
Both (a) & (b)
40. 
What is a "Frame Relay"?
A.
A virtual circuit
B.
Network used to send anaglog information such as voice and data
C.
Network that uses two OSI protocol layers as against three used in X25
D.
Both (b) & (c)
41. 
Physical access to a database can be altered by which factors?
A.
OS used by the software
B.
Hiring procedure
C.
Biometric security tools
D.
Access privileges
42. 
Which of these biometric tools use thermal sensors along with infrared rays for identification?
A.
Key stroke dynamics
B.
Iris/Retinal scan
C.
Speech recognition
D.
Fingerprint scanning
43. 
The smallest unit of information stored on a hard disk is _____ ?
A.
Track
B.
Sector
C.
Cluster
D.
Both (a) & (b)
44. 
_____ are self replicating malicious code independent of the action of the user, but slow down the processor on entering a network
A.
Viruses
B.
Worms
C.
Trojan Horse
D.
Both (b) & (c)
45. 
Which of the following is the most crucial fact that has to be taken care with respect to LANs security?
A.
There should be an effective security of organizational data files and program libraries
B.
Logs should be maintained for recording of all security related incidents
C.
Passwords, should be chosen carefully
D.
Administer's account should be renamed to deter intruder hacking
46. 
Intruder can be stopped from getting into the system using ________ in Windows NT and__________in Unix?
A.
Access Control List and file system
B.
Security Reference Manager and Syslog
C.
File System and Access Control List
D.
Both (a) & (c)
47. 
The command C:\DIR *.COM would give
A.
An error
B.
All files in c:/drive
C.
All files in c drive with extension "com"
D.
Both (a) & (b)
48. 
The DOS command XCOPY file 1 file 2
A.
Copies the files 2 on file 1
B.
Copies file 1 on file 2
C.
Will give an error
D.
Will create a new file
49. 
Microsoft excel is versatile ___________program
A.
File transfer
B.
Application
C.
Spread sheet
D.
Both (b) & (c)
50. 
Which of the following can be done by Excel?
A.
Calculationd
B.
Copy cut & paste
C.
Reuse of same worksheet
D.
Either (a) or (b)