1. Storage that retains its data after the power is turned off is referred to as _____.
A. volatile storage
B. sequential storage
C. direct storage
D. non-volatile storage
E. mobile storage
2. Which protocol provides e-mail facility among different hosts?
A. FTP
B. SMTP
C. TELNET
D. SNMP
E. None of these
3. Which of the following are components of Central Processing Unit (CPU)?
A. Arithmetic Logic Unit, Mouse
B. Arithmetic Logic Unit, Control Unit
C. Arithmetic Logic Unit, Integrated Circuits
D. Control Unit, Monitor
E. All of the above
4. Firewall in parlance to computers is a method of _____.
A. Stopping unauthorized access
B. Making network more secure against hacking
C. Filtering the data that is going out of network and combing in network
D. All of the above
E. None of these
5. ____this is the act of copying or downloading a program from a network and making multiple copies of it
A. Network piracy
B. Plagiarism
C. Software piracy
D. Site-license piracy
E. None of these
Answers and Explanations
1. Answer - Option D
Explanation -
Non-volatile memory is computer memory that can retrieve stored information even after having been power cycled (turned off and back on).
2. Answer - Option B
Explanation -
Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission. First defined by RFC 821 in 1982, it was last updated in 2008 with the Extended SMTP additions by RFC 5321—which is the protocol in widespread use today. SMTP by default uses TCP port 25.
3. Answer - Option B
Explanation -
A central processing unit (CPU) is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logical, control and input/output (I/O) operations specified by the instructions.
Note:- The term has been used in the computer industry at least since the early 1960s. Traditionally, the term "CPU" refers to a processor, more specifically to its processing unit and control unit (CU), distinguishing these core elements of a computer from external components such as main memory and I/O circuitry.
4. Answer - Option D
Explanation -
Firewall system is designed to prevent unauthorized access to or from a private network. All message entering or leaving the internet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
5. Answer - Option C
Explanation -
Software piracy is the illegal/unauthorized copying or distribution of copy righted software. This can be done by copying, downloading, sharing,selling ,or installing multiple copies onto personal or work computers.