"A Computer is a device that can be instructed to carry out sequences of arithmetic or logical operations automatically via computer programming". Computers follow a generalized set of operations termed as programs. The programs enable the computers to perform an extremely wide range of tasks. Computers are now ubiquitous and are being used in every field of work. Thus, basic knowledge of computers and ability to operate a computer is now crucial for all job aspirants.
Computer Awareness also known as Computer Aptitude is one of the prominent sections in various recruitment related competitive exams in India. Computer Awareness Important Quiz Practice Sets lists some of the important questions for preparation of Computer Awareness module. The most significant topics to be learnt for Computer Awareness module are as follows:
Q1. Computers that control processes, accept data in a continuous.....
A. data traffic pattern
B. data highway
C. infinite loop
D. feedback loop
Answer: D
Q2. A language reflects the way people think mathematically is.....
A. cross platform programming
B. functional
C. event driven programming
D. 3GL business programming
Answer: B
Q3. A mistake in an algorithm that causes incorrect results is called a....
A. logical error
B. syntax error
C. procedural error
D. compiler error
Answer: A
Q4. A device for changing the connection on a connector to a different configuration is....
A. a converter
B. a component
C. an attachment
D. an adapter
Answer: D
Q5. Technique that is used to send more than one call over a single line is
A. Digital transmission
B. Infrared transmission
C. Streaming
D. Multiplexing
Answer: D
Q6. Which of the following would you find on LinkedIn?
A. Games
B. Connections
C. Chat
D. Applications
Answer: B
Q7. The method of Internet access that requires a phone line, but offers faster access speeds than dial-up is the.....Connection
A. Cable access
B. Satellite access
C. Fiber optic service
D. Digital Subscriber Line (DSL)
Answer: D
Q8. ......is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses.
A. Cyber crime
B. Memory shaving
C. Synflooding
D. Software Piracy
Answer: C
Q9. A program either talk or music that is made available in digital format for automatic download over the internet is called a.....
A. wiki
B. broadcast
C. vodcast
D. podcast
Answer: D
Q10. A USB communication device that supports data encryption for secure wireless communication for notebook users is called a...
A. USB Wireless Network adapter
B. wireless switch
C. wireless hub
D. router
Answer: A
A. What the user sees on the screen and how they can interact with it
B. How the operating system responds to user commands
C. the means by which the user interacts with the peripheral devices on the computer.
D. None of these.
Answer: A
Q12. The connection between your computer at home and your local ISP is called.....
A. the last mile
B. the home stretch
C. the home page
D. the vital mile
Answer: A
13. are attempts by individuals to obtain confidential information from you by falsifying their identity through e-mails.
A. Phishing trips
B. Viruses
C. Phishing scams
D. Spyware scams
Answer: A
14. ERP is an acronym for....
A. Enterprise Relationship planning
B. Enterprise Resource planning
C. Enterprise Reorder planning
D. None.
Answer: B
15. Collecting personal information and effectively posing as another individual is known as the crime of .....
A. spooling
B. spoofing
C. hacking
D. identity theft
Answer: D
16. The signal that a computer is waiting for a command from the user is....
A. prompt
B. event
C. time slice
D. interrupt
Answer: A
17. Physical security is concerned with protecting computer hardware from human tampering & natural disasters and security is concerned with protecting software from unauthorized tampering or damage.
A. data
B. cyber
C. internet
D. metaphysical
Answer: A
18. Which ports connect special types of music instruments to sound cards?
A. BUS
B. CPU
C. USB
D. Musical Instrument Digital Interface (MIDI)
Answer: D
19. Where you are likely to find an embedded operating system?
A. On a desktop operating system
B. On a networked PC
C. On a PDA
D. On a Mainframe.
Answer: C
20. Which of the following places the common data elements in order from smallest to largest?
A. Bit, byte, character, record, field, file, database
B. Database, file, record, field, character
C. Character, file, record, field, database
D. Character, field, record, file, database
Answer: D
Q21. Which protocol provides e-mail facility among different hosts?
A. File Transfer Protocol (FTP)
B. TELNET
C. Simple Mail Transfer Protocol (SMTP)
D. Simple Network Management Protocol (SNMP)
Answer: C
Q22. Which of the following memory is non-volatile?
A. DRAM
B. SRAM
C. ROM
D. None of the above
Answer: C
Q23. What is embedded system?
A. The programme which arrives by being wrapped in box.
B. The programme which is the permanent part of the computer
C. The computer which is the part of a big computer.
D. Some combination of computer hardware and software.
Answer: D
Q24. Which device connects a LAN to the Internet ?
A. Adapter
B. Repeater
C. Router
D. None of the above
Answer: C
Q25. EBCDIC stands for
A. Extended Binary Coded Decimal Interchange Code
B. Extended Bit Code Decimal Interchange Code
C. Extended Bit Case Decimal Interchange Code
D. Extended Binary Case Decimal Interchange Code
Answer: A
Q26. The first general purpose electronic digital computer in the world was?
A. UNIVAC (Universal Automatic Computer)
B. EDVAC (Electronic Discrete Variable Automatic Computer)
C. ENIAC (Electronic Numerical Integrator & Computer)
D. EDSAC (Electronic Delay Storage Automatic Computer)
Answer: C
Q27. Signals can be analog or digital and a computer that processes the both type of signals is known as?
A. Analog computer
B. Digital Computer
C. Hybrid Computer
D. Mainframe Computer
Answer: C
Q28. Human beings are referred to as Homo sapiens, which device is called Silico Sapiens?
A. Monitor
B. Hardware
C. Robot
D. Computer
Answer: D
Q29. EBCDIC can code up to how many different characters?
A. 256
B. 16
C. 32
D. 64
Answer: A
Q30. Different components of the motherboard of a PC unit are linked together by sets of parallel electrical conducting lines. What are these lines called?
A. Conductors
B. Buses
C. Connectors
D. Consecutive
Answer: B
A. Reproduce Array of Intelligent Disks
B. Reproduce Array of Inexpensive Disks
C. Redundant Array of Inexpensive Drives
D. Redundant Array of Inexpensive Disks
Answer: D
Q52. Software that monitors your online computer activities is known as
A. Malware
B. Spyware
C. Freeware
D. None
Answer: B
Q53. Software that is made available at no cost and is sometimes used to entice a user to purchase the unbranded version with no advertising.
A. Malware
B. Spyware
C. Freeware
D. None
Answer: C
Q54. Which is used to display one or more web pages within another normal web page?
A. IFRAME
B. Hyperlink
C. Home page
D. None
Answer: A
Q55. What is the main difference between a mainframe and a super computer?
A. Supercomputer is much larger than mainframe computers
B. Supercomputers are much smaller than mainframe computers
C. Supercomputers are focused to execute few programs as fast as possible while mainframe uses its power to execute as many programs concurrently.
D. None
Answer: B
Q56. storage area used to store data to a compensate for the difference in speed at which the different units can handle data is
A. Memory
B. Buffer
C. Accumulator
D. None
Answer: B
Q57. Computer is free from tiresome and boardroom. We call it
A. Accuracy
B. Diligence
C. Versatility
D. None
Answer: B
Q58. Integrated Circuits (ICs) are related to which generation of computers?
A. First generation
B. Second generation
C. Third generation
D. None
Answer: C
Q59. Which type of computers uses the 8-bit code called EBCDIC?
A. Minicomputers
B. Microcomputers
C. Mainframe computers
D. None
Answer: C
Q60. The ALU of a computer responds to the commands coming from
A. Primary memory
B. Control section
C. External memory
D. Cache memory
Answer: B
Q61. A physical connection between the microprocessor memory and other parts of the microcomputer is known as
A. Path
B. Address bus
C. Route
D. All of the above
Answer: B
Q62. A technique used by codes to convert an analog signal into a digital bit stream is known as
A. Pulse code modulation
B. Pulse stretcher
C. Query processing
D. Queue management
Answer: A
Q63. Before a disk drive can access any sector record, a computer program has to provide the record’s disk address. What information does this address specify?
A. Track number
B. Sector number
C. Surface number
D. All of above
Answer: D
Q64. What is the responsibility of the logical unit in the CPU of a computer?
A. To produce result
B. To compare numbers
C. To control flow of information
D. To do math’s works
Answer: B
Q65. The terminal device that functions as a cash register, computer terminal, and OCR reader is the?
A. Data collection terminal
B. OCR register terminal
C. Video Display terminal
D. POS terminal
Answer: D
Q66. A set of flip flops integrated together is called
A. Counter
B. Adder
C. Register
D. None of the above
Answer: C
Q67. A register organized to allow moving left or right operations is called a
A. Counter
B. Loader
C. Adder
D. Shift register
Answer: D
Q68. How many address lines are needed to address each machine location in a 2048 x 4 memory chip?
A. 10
B. 11
C. 8
D. 12
Answer: B
Q69. Multi user systems provided cost savings for small business because they use a single processing unit to link several
A. Personal computers
B. Workstations
C. Dumb terminals
D. Mainframes
Answer: C
Q70. The difference between memory and storage is that memory is and storage is
A. Temporary, permanent
B. Permanent, temporary
C. Slow, fast
D. All of the above
Answer: A
Q71. Which of the following is the first computer to use Stored Program Concept?
A. UNIVAC
B. ENIAC
C. EDSAC
D. None of above
Answer: C
Q72. 1 nibble equals to
A. 1 bits
B. 2 bits
C. 4 bits
D. 8 bits
Answer: C
Q73. The most commonly used standard data code to represent alphabetical, numerical and punctuation characters used in electronic data processing system is called
A. ASCII
B. EBCDIC
C. BCD
D. All of the above
Answer: A
Q74. The term GIGO (Garbage In Garbage Out) is related to which characteristics of computers?
A. Speed
B. Automatic
C. Accuracy
D. Reliability
Answer: C
Q75. Hard disk is coated on both sides with
A. Magnetic metallic oxide
B. Optical metallic oxide
C. Carbon layer
D. All of the above
Answer: A
Q76. The contents of information are stored in
A. Memory data register
B. Memory address register
C. Memory arithmetic registers
D. Memory access register
Answer: A
Q77. The programs which are as permanent as hardware and stored in ROM is known as
A. Hardware
B. Software
C. Firmware
D. ROM ware
Answer: C
Q78. Which of the following memories must be refreshed many times per second?
A. Static RAM
B. Dynamic RAM
C. EPROM
D. ROM
Answer: B
Q79. In which mode, the communication channel is used in both directions at the same time?
A. Full-duplex
B. Simplex
C. Half-duplex
D. None of the above
Answer: A
Q80. Which of the printers used in conjunction with computers uses dry ink powder?
A. Daisy wheel printer
B. Line printer
C. Laser printer
D. Thermal printer
Answer: C
A. Matrix printer
B. Impact printer
C. Laser printer
D. Manual printer
Answer: B
Q82. Which of these is considered intelligent CASE tool?
A. Workbench
B. Toolkit
C. Upper CASE
D. Lower CASE
Answer: A
Q83. Origin of internet can be tracked from
A. Satellite networks
B. Radio networks
C. ARPANET (Advanced Research Projects Agency Network)
D. None
Answer: C
Q84. is used by public & private enterprises to publish and share financial information with each other and industry analysts across all computer platforms & the Internet.
A. Extensible Markup Language (XML)
B. Extensible Business Reporting Language (XBRL)
C. Enterprise Application Integration (EAI)
D. None
Answer: B
Q85. System proposal is prepared in …… phase of SDLC.
A. Conception
B. Initiation
C. Analysis
D. Design
Answer: B
Q86. A data warehouse
A. Contains numerous naming conventions and formats
B. Is organized around important subject areas
C. Contains only current data
D. None
Answer: B
Q87. symbol in DOS commands is used to
A. Compare two values
B. Redirect Input
C. Redirect Output
D. None
Answer: C
Q88. To connect networks of similar protocols, are used
A. Routers
B. Gateways
C. Bridges
D. None
Answer: C
Q89. is one reason for problems of data integrity
A. Data availability constraints
B. Data inconsistency
C. Data redundancy
D. None
Answer: C
Q90. Which of the following is an advantage of mounting an application on the web?
A. the possibility of 24-hour access for users
B. creating a system that can extend globally
C. standardizing the design of the interface
D. All of these
Answer: D
A. Global System for Mobile
B. Global Service for Mobile
C. Global System for Mobile communication
D. None
Answer: C
Q102. TCP stands for
A. Transmission Control Protocol
B. Telnet Control Protocol
C. Transmission Channel Protocol
D. None
Answer: A
Q103. Proprietary Software is also called as
A. Closed Source Software
B. Open Source Software
C. Commercial Software
D. None
Answer: A
Q104. A product that is owned exclusively by a single company that can only function properly, if it is used with other products owned by the same company?
A. Proprietary Software
B. Public Domain Software
C. Commercial Software
D. None
Answer: A
Q105. Freeware can be classified into four types. It includes
A. Donationware, Postcardware
B. Abandonware, Adware
C. Both (A) & (B)
D. None
Answer: C
Q106. Which of the following activity can be termed as software piracy?
A. Soft loading
B. Counterfeiting
C. Renting
D. All of these
Answer: D
Q107. Linux is a type of Software
A. Open Source
B. Public Domain
C. Commercial
D. None
Answer: A
Q108. A coding language that is compatible with windows servers which is used for increased functionality on a website or to work with a database
A. HTML
B. ASP
C. XML
D. None
Answer: B
Q109. A code that represents English characters as numbers and ranging from 0 to 127.
A. ASCII
B. EBCDIC
C. BCD
D. All of above
Answer: A
Q110. An email feature, which is used to send a copy of an email to one or many other people at the same time that you are sending it to the main recipient/s is called
Q111. An email feature which is used to send someone a BCC email, their email address will not show in the "to" field
A. CC
B. BCC
C. CC & BCC
D. None
Answer: B
Q112. GUI stands for
A. Graphic Uninstall/Install
B. Graphical User Interface
C. General Utility Interface
D. None
Answer: B
Q113. A….. is a design tool that graphically shows the logic in a solution algorithm.
A. Hierarchy Chart
B. Flow Chart
C. Structure Chart
D. None
Answer: B
Q114. Programs designed to perform specific tasks related to managing computer resources are called
A. System Software
B. Utility Software
C. Application Software
D. None
Answer: B
Q115. A file that contains definitions of the paragraph and character styles for your document and all things you customized like toolbars and menus is called a…….
A. guide
B. prompt
C. template
D. None
Answer: C
Q116. Programs designed specifically to address general purpose applications & special-purpose applications are called
A. System Software
B. Application Software
C. Operating System
D. None
Answer: B
Q117. A ….. contains buttons & menus that provide quick access to commonly used commands.
A. menubar
B. toolbar
C. window
D. None
Answer: B
Q118. What is the split – MAC Architecture?
A. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up collision domains.
B. The split-MAC architecture uses MAC addresses to create a forward/fliter table
C. Both (A) & (B)
D. NoneAnswer: A
Q119. In …..normal form, all non-key fields of data structure are dependent on the whole key.
A. First
B. Second
C. Third
D. None
Answer: B
Q120. Which of the following are tasks that may be completed when configuring your e-mail client?
A
. Provide the IP address of your ISP’s mail server
B. Provide the name of your e-mail account
C. All of these
D. None of these
Answer: A
A. picture element or dot on a screen
B. point of ink on a laser printed page
C. point of ink on an ink jet printed page
D. None
Answer: A
Q122. Expansion cards are inserted into
A. CPU
B. Slots
C. Peripheral devices
D. None
Answer: B
Q123. is a communication technology used by some incoming mail servers.
A. TCP
B. POP3
C. FTP
D. None
Answer: B
Q124. Which of the following format for storing & backing up computer data on tape that evolved from Digital Audio Tape (DAT) technology?
A. Data Aggregation
B. Digital Data Storage
C. Virtual Tape System
D. None
Answer: B
Q125. The two basic parts of URLs are
A. TCP & IP
B. the protocol & the domain name
C. TCP & FTP
D. None
Answer: B
Q126. The storage locations in the internal storage of a CPU is called
A. reference points
B. addresses
C. locations
D. None
Answer: B
Q127. The …… database is the most widely used database structure
A. General
B. Standard
C. Relational
D. None
Answer: C
Q128. Mail from unwanted senders can be blocked by…….
A. e-mailing them & asking to be removed from the list
B. using mail filters
C. clicking the unsubscribe link
D. None
Answer: B
Q129. ATM machines run ……. OS
A. Open Source
B. Closed Source
C. embedded
D. None
Answer: C
Q130. Which of the following is possible with open architecture?
A. Hot swapping of devices
B. A minimum of six new devices to be added to a computer
C. Users to upgrade and add new devices as they come on the market
D. None
Answer: C
Q131. The fraudulent practice of sending emails purposing to be from reputable companies in order to induce individuals to reveal personal information(Credit & Debit card details) is called
A. Hot swapping of devices
B. Pharming
C. Phishing
D. None
Answer: C
Q132. NIC stands for
A. Network Internal Card
B. Network Interconnection Channel
C. Network Interface Card
D. None
Answer: C
Q133. Is the Virus that overwrites the files or a few parts being replaced?
A. Virus
B. File infectors
C. worm
D. None
Answer: B
Q134. A dynamic website that is normally database driven and which enables the owner/user to manage the content of their own website without needing to know any coding at all is known as
A. Content Management System (CMS)
B. ASP
C. DNS
D. None
Answer: A
Q135. An Internet service that translates domain names to the IP addresses is called
A. CMS
B. ASP
C. DNS
D. None
Answer: C
Q136. A hacker installs malicious code on a personal computer or server. This code then redirects clicks you make on a Web site to another fraudulent Web site without your consent or knowledge. It is known as….
A. Phishing
B. Smishing
C. Pharming
D. None
Answer: C
Q137. The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
A. Pharming
B. Smishing
C. Vishing
D. None
Answer: C
Q138. A type of phishing attack where mobile phone users receive text messages containing a Web site hyperlink is called
A. Pharming
B. Smishing
C. Vishing
D. None
Answer: B
Q139. The creation of Internet Protocol (IP) packets with a forged source IP address, with the purpose of concealing the identity of the sender or impersonating another computing system is called …………..
A. Pharming
B. Spoofing
C. Vishing
D. None
Answer: B
Q140. A malware program that can be used by a black hat cracker to remotely take control of a system for further attacks like spam emails or Denial of Service attacks, without a user’s knowledge is called……
A. Zombie
B. Spoofing
C. Vishing
D. None
Answer: A
Q141. Ethical hackers who use their skill to secure the integrity of computer systems or networks is called
A. Black Hat
B. White Hat
C. Green Hat
D. None
Answer: B
Q142. A type of malicious software that is activated each time your system boots up. This malicious software difficult to detect because they are activated before your system's Operating System has completely booted up is called
A. Phishing
B. Rootkits
C. Pharming
D. None
Answer: B
Q143. Spam over instant messenger is called spim while spam over Internet telephony is known as
A. Malware
B. Spit
C. Pharming
D. None
Answer: B
Q144. The unauthorized activities of malicious software is called
A. Pharming
B. Payload
C. Phishing
D. None
Answer: B
Q145. Unauthorized access to restricted systems or resources is referred as
A. Pharming
B. Penetration
C. Phishing
D. None
Answer: B
Q146. Unauthorized access to information by using a terminal that is already logged on with an authorized ID is called
A. Piggybacking
B. Penetration
C. Phishing
D. None
Answer: A
Q147. Modifying data in a Domain Name System (DNS) server so that calls to particular Websites or even entire domains are misdirected for fraudulent purposes is termed as
A. DNS cache poisoning
B. Penetration
C. Phishing
D. None
Answer: A
Q148. Any deliberate damage to operations or equipments is called
A. Piggybacking
B. Sabotage
C. Phishing
D. None
Answer: B
Q149. Sending large numbers of unwanted e-mail messages to a single recipient or to a group of such recipients is termed as
A. Logic bomb
B. Mail bombing
C. Time bomb
D. None
Answer: B
Q150. Malicious modification or destruction of data such as changing information on Web sites is called
A. Super zapping
B. Vandalism
C. Spamming
D. None
Answer: B
A. Multipurpose Internet Mail Extension
B. Multicasting Internet Mail Extension
C. Multiple Internet Mail Extension
D. None
Answer:A
Q162. FPI stands for
A. Figure per inch
B. Frames per inch
C. Faults per inch
D. None
Answer: B
Q163. The process of analyzing large data sets in search of new, previously undiscovered relationships is known as:
A. data mining
B. data marting
C. data maintenance
D. data warehousing
Answer: A
Q164. Collection of interrelated data and set of program to access them is called
A. Database
B. Database Management System
C. Data Structure
D. data warehousing
Answer: A
Q165. A repository of data that is designed to serve a particular community of knowledge workers is called
A. datamart
B. data maintenance
C. data warehousing
D. None
Answer: A
Q166. Keys that are used in combination with some other key, they have been programmed to perform certain tasks is called
A. Function keys
B. Alphanumeric keys
C. Modifier keys( Alt, Ctrl)
D. None
Answer: C
Q167. A key that is used to alternate the input mode of a group of keys on a keyboard is known as
A. Function keys
B. Alphanumeric keys
C. Toggle Keys (Caps Lock, Nums Lock)
D. None
Answer: C
Q168. Networking can be classified into two types. It includes
A. Server-based networking (A central Server)
B. Peer to Peer networking (Group of computers that perform both Server & Client function)
C. Both (A) & (B)
D. None
Answer: A
Q169. Which is used to connect a computer to the cabling used in LAN?
A. Network Interface Card (or) Network Adapter
B. Router
C. Modem
D. None
Answer: A
Q170. A device which converts data between the analog form used on telephone lines & the digital form used on computers is………
A. Network Interface Card (or) Network Adapter
B. Router
C. Modem (Modulator Demodulator)
D. None
Answer: C
Q171. A relay or interconnecting device that is used to join two or more LANs is called
A. Network Interface Card (or) Network Adapter
B. Router
C. Bridge
D. None
Answer: C
Q172. A device that regenerates the signal transmitted on a cable in a network is called
A. Repeater
B. Router
C. Bridge
D. None
Answer: A
Q173. A networking device that is used to receive signals from one Computer & transmit them on to other computers in a network is called……..
A. Repeater
B. Hub
C. Bridge
D. None
Answer: B
Q174. Hub can be divided into two types. It includes……
A. Active Hub (Acts as a Repeater – regenerates & sends out a stronger signal)
B. Passive Hub (Acts as a Junction box – Splits incoming signals for transmission)
C. Both (A) & (B)
D. None
Answer: C
Q175. An intelligent Hub that has the ability to determine the destination of a packet sent across the network is called………
A. Repeater
B. Switch
C. Bridge
D. None
Answer: B
Q176. A most Sophisticated relay device used in a network that can be used to interconnect systems with different protocols, formatting languages and architecture is called………
A. Gateway
B. Switch
C. Bridge
D. None
Answer: A
Q177. CSMA/CD stands for
A. Carrier Sense Multiple Access with Correction Detection
B. Code Sense Multiple Access with Collision Detection
C. Carrier Sense Multiple Access with Collision Detection
D. None
Answer: C
Q178. A…… is required at each end to absorb the signal so that it does not reflect back across the bus.
A. gateway
B. terminator
C. bridge
D. None
Answer: B
Q179. Bus Topologies can be classified into two types. It includes
A. Regular Bus
B. Local Bus
C. Both (A) & (B)
D. None
Answer: C
Q180. A list of rules for transferring data over a network is called?
A. Protocol
B. Program code
C. Rules
D. None
Answer: A
Q181. Star topologies are normally implemented using a
A. Unshielded Twisted Pair (UTP) cable
B. Twisted Pair cable
C. Fiber Optic Cable
D. None
Answer: A
Q182. A set of stations connected serially by cable is known as
A. Star topology
B. Bus topology
C. Ring topology
D. None
Answer: C
Q183. OSI stands for
A. Open Systems Interconnection
B. Open Source Interconnection
C. Open Service Interconnection
D. None
Answer: A
Q184. Layer which deals with the transportation of binary data and defines cable & electrical specifications is known as……….
A. Data Link Layer
B. Physical Layer
C. Session Layer
D. None
Answer: B
Q185. Layer which converts data frames into bits and also convert bits into frames is known as……….
A. Data Link Layer
B. Transport Layer
C. Session Layer
D. None
Answer: A
Q186. Layer which deals with translation of logical & physical addresses & determines route from source to destination & also control network traffic is known as……….
A. Network Layer
B. Transport Layer
C. Session Layer
D. None
Answer: A
Q187. Layer which manages flow control & ensures reliable delivery of data packets in sequence with no losses or duplications is known as………
A. Presentation Layer
B. Transport Layer
C. Session Layer
D. None
Answer: B
Q188. Layer which establishes, maintains & terminates a connection while communicating with other client is known as………
A. Presentation Layer
B. Transport Layer
C. Session Layer
D. None
Answer: C
Q189. Layer which translates data format & deals with compression of data and network security is known as………
A. Presentation Layer
B. Application Layer
C. Session Layer
D. None
Answer: A
Q190. Layer which is the user interface to access the network services such as file transfer/ database access is known as………
A. Presentation Layer
B. Application Layer
C. Session Layer
D. None
Answer: B
Q191. A long message that needs to be transmitted is broken into smaller packets of fixed size for error free transmission is termed as……..
A. Data Sequencing
B. Flow Control
C. Error control
D. None
Answer: A
Q192. ICMP stands for
A. Internet Control Message Protocol
B. Internet Connection Management Protocol
C. Internet Control Management Protocol
D. None
Answer: A
Q193. IDRP stands for
A. ICMP Repeater- Discovery Protocol
B. ICMP Router- Discovery Protocol
C. IDRP Router- Discovery Protocol
D. None
Answer: B
Q194. RSS Stands for
A. Rich Site Summary
B. Really Simple Syndication
C. (A) or (B)
D. None
Answer: C
Q195. What is the full form of UDP?
A. Upper Divisional Protocol
B. User Datagram Protocol
C. Under Divisional Protocol
D. None
Answer: B
Q196. An Interface refers to a specification by which programs can communicate with a web server is called
A. Graphical User Interface (GUI)
B. Musical Instrument Digital Interface (MIDI)
C. Common Gateway Interface (CGI)
D. None
Answer: C
Q197. VoIP stands for
A. Video Over Internet Protocol
B. Voice Over Internet Protocol
C. Voice On Internet Protocol
D. None
Answer: B
Q198. The two application protocols most commonly associated with
A. Network File System (NFS)
B. Common Internet File System (CIFS)
C. Both (A) & (B)
D. None
Answer: C
Q199. An attacker outside your network pretends to be a part of your network or legal terminal is called…
A. Password Attacks
B. IP Spoofing
C. Identity Theft
D. None
Answer: C
Q200. A reliability & flow control technique where the source sends one packet, starts a timer and waits for an acknowledgement before sending a new packet is called
A. Positive Acknowledgement Retransmission (PAR)
B. Checksum
C. Routing
D. None
Answer: A
Q201. Booting can be divided into two types. They are?
A. Cold Booting
B. Warm Booting
C. (A) & (B)
D. None
Answer: C
Q202. What is booting?
A. When a computer is switched on & the OS gets loaded from hard disk to main memory
B. When a computer is switched on & the OS gets loaded from CPU to main memory
C. (A) or (B)
D. None
Answer: A
Q203. What is Warm booting?
A. When a computer is turned on after it has been completely shut down.
B. When a computer is restarted by pressing the restart button or pressing (ctrl + Alt + Del) key.
C. (A) or (B)
D. None.
Answer: B
Q204. Which of the following is a function of Operating System (OS)? ?
A. Process & Memory Management
B. File Management
C. Input/Output Management
D. All of the above
Answer : D
Q205. Which of the following is an example of Single User Operating System? ?
A. MS-DOS
B. Windows 9X
C. (A) & (B)
D. None
Answer: C
Q206. Which of the following is an example of Multi User Operating System? ?
A. UNIX
B. LINUX
C. Windows 2000/2007
D. (D) (A) & (B) &(C)
Answer: D
Q207. What is Multi – Tasking Operating System?
A. More than one processes can be executed concurrently
B. Processing is done with a time constraint
C. A type of OS which do not interact with a computer directly.
D. An OS which use multiple central processors to serve multiple real time applications.
Answer: B
Q208. What is Real Time Operating System (RTOS) ?
A. More than one processes can be executed concurrently.
B. Processing is done with a time constraint
C. type of OS which do not interact with a computer directly.
D. An OS which use multiple central processors to serve multiple real time applications.
Answer: B
Q209. What is Batch Processing Operating System (RTOS)?
A. More than one processes can be executed concurrently.
B. Processing is done with a time constraint
C. A type of OS which do not interact with a computer directly.
D. An OS which use multiple central processors to serve multiple real time applications.
Answer: C
Q210. What is Distributed Operating System (RTOS)?
A. More than one processes can be executed concurrently.
B. Processing is done with a time constraint
C. A type of OS which do not interact with a computer directly.
D. An OS which uses multiple central processors to serve multiple real time applications.
Answer: D
Q271. If your computer rebooting itself then it is likely that
A. It has a virus
B. It does not have enough memory
C. There has been a power surge
D. None
Answer: A
Q272. The of a Threat measures its potential impact on a System
A. vulnerabilities
B. degree of harm
C. susceptibility
D. None
Answer: B
Q273. A digital signature is
A. scanned signature
B. encrypting information
C. signature in binary form
D. None
Answer: B
Q274. A firewall operated by
A. the pre-purchase phase
B. isolating intranet from extranet
C. screening packets to/from the network & provide controllable filtering of network traffic.
D. None
Answer: C
Q275. Which one of the following is a cryptographic protocol used to secure http concession?
A. Transport Layer Security
B. Explicit Congestion Notification
C. Resource Reservation Notification (RRN)
D. None
Answer: A
Q276. Which of the following inputs a computer’s memory, but unlike a virus, it does not replicate itself?
A. Trojan Horse
B. Logic bomb
C. Firewall
D. None
Answer: B
Q277. Which one of the following is a key function of firewall?
A. Monitoring
B. deleting
C. moving
D. None
Answer: A
Q278. The load instruction is mostly used to designate a transfer from memory to a processor register known as
A. Program counter
B. instruction register
C. accumulator
D. None
Answer: C
Q279. The most frequently used instructions of a computer program are likely to be fetched from
A. cache
B. cookie
C. main memory
D. None
Answer: A
Q280. Arithmetic Logic Unit (ALU) and control sections have special purpose locations called
A. secondary memory
B. registers
C. accumulator
D. None
Answer: B