Sie sind auf Seite 1von 21

Answer A.

F9
Computer Questions Set –
5. What is the shortcut key for “Find and
(181, 182, 183, 184, 185, 186, Replace” dialog box?
187, 188, 189, 190, 192, 193, A. Ctrl + F
B. Ctrl + R
194, 195, 196, 197, 198, 199, C. Ctrl + H
D. Ctrl+Shift + F
200, 201) E. None of these

Answer C. Ctrl + H

6. What is the shortcut key for “Font”


dialog box?
A. Ctrl + F
B. Ctrl + D
Computer Questions Set – 01 C. Ctrl + G
1. What happens when you insert an D. Ctrl + F3
AutoShape by simply clicking in the E. None of these
document?
A. it appears near the insertion point Answer B. Ctrl + D.
B. it is inserted in its default size
C. it is selected 7. What is the shortcut key for “Subscript”
D. All of the above the selected text?
E. None of these A. Ctrl + =
B. Ctrl + –
Answer D. All of the above C. Ctrl + Shift + =
D. Ctrl + Shift + –
2. What must be used to control the layering E. None of these
of objects?
A. formatting tool bar Answer A. Ctrl + =.
B. picture tool bar
C. drawing tool bar 8. What is the shortcut key for “Spelling
D. image tool bar Check” in document?
E. None of these A. F7
B. Shift+F7
Answer C. drawing tool bar C. Ctrl + F7
D. Alt + F7
3. What is the shortcut key to “Center E. None of these
Alien” the selected text?
A. Ctrl + C Answer A. F7
B. Ctrl + E
C. Ctrl + F 9. What is the shortcut key to close active
D. Shift+Alt document in Microsoft Word?
E. None of these A. Ctrl + F4
B. Shift + F
Answer B. Ctrl + E C. Ctrl+Shift + F4
D. Ctrl + D
4. What is the shortcut key to “Update E. None of these
Formula” in a table?
A. F9 Answer A. Ctrl + F4
B. Alt+FB
C. Ctrl + F9 10. What is the shortcut key for
D. Shift+ F9 “Superscript” the selected text?
E. None of these A. Ctrl + =
B. Ctrl + –
C. Ctrl+Shift + = without this access is known as the
D. Ctrl+Shift + – _______
E. None of these A. digital divide
B. Internet divide
Answer C. Ctrl+Shift + = C. Web divide
D. E-illiteracy
E. None of these

Computer Questions Set – 02 Answer A. digital divide.

1. What do you call the programs that are 6. Which of the following is the smallest
used to find out possible faults and their storage?
causes? A. Megabyte
A. operating system extensions B. Gigabyte
B. cookies C. Terabyte
C. diagnostic software D. All of these
D. boot diskettes E. None of these
E. None of these
Answer A. Megabyte.
Answer C. diagnostic software
7. Hardware or software designed to guard
2. The ability to recover and read deleted or against unauthorized access to a computer
damaged files from a criminal’s computer network is known as a(n) ________
is an example of a law enforcement A. Hacker-proof program.
speciality called _______ B. Firewall.
A. robotics C. Hacker-resistant server.
B. simulation D. Encryption safe wall.
C. computer forensics E. None of these
D. animation
E. None of these Answer B. Firewall.

Answer C. computer forensics 8. The scrambling of code is known as ____


A. Encryption.
3. _______ are used to identify a user who B. a firewall.
returns to a Website. C. Scrambling.
A. Cookies D. Password proofing.
B. Plug-ins E. None of these
C. Scripts
D. ASPs Answer A. Encryption
E. None of these
9. To prevent the loss of data during power
Answer A. Cookies failures, use a(n) ________
A. Encryption program.
4. Which of the following contains B. Surge protector.
permanent data and gets updated during C. Firewall.
the processing of transactions? D. UPS
A. Operating System File E. None of these
B. Transaction file
C. Software File Answer D. UPS
D. Master file
E. None of these 10. In which type of computer, data are
represented as discrete signals.
Answer D. Master file A. Analog computer
B. Digital computer
5. The difference between people with access C. both
to computers and the Internet and those
D. Hybrid Computer C. Virus.
E. None of these D. Macro virus.
E. None of these
Answer B. Digital computer
Answer B. Trojan horse.

6. An intentionally disruptive program that


Computer Questions Set – 03 spreads from program to program or
from disk to disk is known as a _______
A. Trojan horse.
1. ______ are set of rules and procedures to B. Virus.
control the data transmission over the C. Time bomb.
internet D. Time-related bomb sequence.
A. IP address E. None of these
B. Domains
C. Protocol
Answer B. Virus.
D. Gateway
E. None of these
7. What type of virus uses computer hosts to
reproduce itself?
Answer C. Protocol A. Time bomb
B. Worm
2. NOS stands for _______ C. Melissa virus
A. Node operating system D. Macro virus
B. Non-open software E. None of these
C. Network Operating system
D. Non-operating software
Answer B. Worm
E. None of these
8. The thing that eventually terminates a
Answer C. Network Operating system worm virus is a lack of _______
A. Memory or disk space.
3. What is the name of an application B. Time.
program that gathers user information C. CD drives space.
and sends it to someone through the D. CD-RW.
Internet? E. None of these
A. A virus
B. Spybot
Answer A. Memory or disk space
C. Logic bomb
D. Security patch
9. When a computer is switched on, the
E. None of these
booting process performs ______
A. Integrity Test
Answer B. Spybot B. Power-On Self-Test
C. Correct Functioning Test
4. When a logic bomb is activated by a time- D. Reliability Test
related event, it is known as a ______ E. None of these
A. Time-related bomb sequence.
B. Virus.
Answer B. Power-On Self-Test
C. Time bomb.
D. Trojan horse
10. ASCII is a coding system that provides
E. None of these
________
A. 256 different characters
Answer C. Time bomb
B. 512 different characters
5. A program that performs a useful task C. 1024 different characters
while simultaneously allowing destructive D. 128 different characters
acts is a ______ E. None of these
A. Worm.
B. Trojan horse. Answer D. 128 different characters
6. Which is an electronic device controlled
by a motor that moves the hard drive
Computer Questions Set – 04 head arm?
A. Accelerator
1. Which of the following contains B. Actuator
the root directory and all C. Aggregator
other subdirectories? D. Selection logic
A. File Path E. None of these
B. Full Path
C. Absolute Path Answer B. Actuator
D. All of these
E. None of these 7. Which of the following program is
designed to improve the overall
Answer D. All of these performance of the computer?
A. Accelerator
2. FQDN stands for _______ B. Actuator
A. Full Qualified Domain Name C. Aggregator
B. First Queue Domain Name D. Selection logic
C. Fully Qualified Domain Name E. None of these
D. First Qualified Domain Name
E. None of these Answer A. Accelerator

Answer C. Fully Qualified Domain Name 8. Which of the following is a software


program designed to collect data from
3. FQDN is also known as ______ multiple sources?
A. Alternate Domain Name A. Accelerator
B. Absolute Domain Name B. Actuator
C. Active Domain Name C. Aggregator
D. Application software D. Selection logic
E. None of these E. None of these

Answer B. Absolute Domain Name Answer C. Aggregator

4. ________ is a computer that is responsible 9. _______ is a spreadsheet cell that remains


for giving rights to other computers that the same and does not change regardless
are not a member of its network. if it is copied or moved.
A. Absolute Server A. Address Cell Reference
B. Active Server B. Application Cell Reference
C. Application server C. Absolute Cell Reference
D. Access server D. Access Cell Reference
E. None of these E. None of these

Answer D. Access server Answer C. Absolute Cell Reference

5. Which of the following is any third-party 10. _______ is a method of computer


software program that is added to a programming where the programmer
program to give it additional features? uses absolute instead of indirect
A. Application addressing.
B. Add on A. Address Coding
C. Adder B. Application Coding
D. All of these C. Absolute Coding
E. None of these D. Access Coding
E. None of these
Answer B. Add on
Answer C. Absolute Coding
D. Looping
E. None of these

Answer C. Machine dependent.

6. Which logic is used to select the proper


path out of two or more alternative paths
in the program logic?
A. Looping logic
Computer Questions Set – 05 B. Sequence logic
C. Iteration logic
1. Software required to run the hardware is D. Selection logic
known as _______ E. None of these
A. Task Manager
B. Task Bar Answer D. Selection logic
C. Program Manager
D. Device Driver
7. An error in software or hardware is called
E. None of these
a bug. What is the alternative computer
jargon for it?
Answer D. Device Driver A. Leech
B. Squid
2. A system call is a method by which a C. Slug
program makes a request to the _______ D. Glitch
A. Input Management E. None of these
B. Output Management
C. Interrupt processing Answer D. Glitch
D. Operating system
E. None of these
8. ________ is computer software designed
to operate the computer hardware and to
Answer D. Operating system provide platform for running application
software
3. Shell is the exclusive feature of _______ A. Application software
A. UNIX B. System software
B. DOS C. Software
C. System software D. Operating system
D. Application software E. None of these
E. None of these
Answer B. System software
Answer A. UNIX
9. The _______ is the amount of data that a
4. An assembler is ______ storage device can move from the storage
A. Programming language dependent. medium to the Computer per second
B. Syntax dependent. A. data migration rate
C. Machine dependent. B. data digitizing rate
D. Data dependent C. data transfer rate
E. None of these D. data access rate
E. None of these
Answer C. Machine dependent.
Answer C. data transfer rate
5. The________is a program-planning tool
that allows the programmers to plan 10. A program design tool in which standard
program logic by writing program graphical symbols are used to represent
instructions in an ordinary language the logical flow of data is called as a
A. Flowchart _______
B. Pseudocode A. Flowchart
C. Program B. Pseudocode
C. Algorithm B. Direct Memory Access
D. Structured Chart C. Distinct Memory Allocation
E. None of these D. Direct Memory Allocation
E. None of these
Answer A. Flowchart
Answer B. Direct Memory Access.

6. The term _______ designates equipment


Computer Questions Set – 06 that might be added to a computer system
to enhance its functionality.
1. Which of the following is a combination of A. Digital device
hardware and software that facilitates the B. System add-on
sharing of information between C. Disk pack
computing devices? D. Peripheral device
A. Network E. None of these
B. Peripheral
C. Expansion Board Answer B. System add-on
D. Digital device
E. None of these 7. A computer cannot ‘boot’ if it does not
have the _______
Answer A. Network A. Compiler
B. Loader
2. The amount of vertical space between C. Operating System
lines of text in a document is called D. Assembler
_________ E. None of these
A. double-space
B. line spacing Answer C. Operating System
C. single space
D. vertical spacing 8. Most of the time, what type of computers
E. None of these are client computers in a client-server
system?
Answer B. line spacing A. Mainframe
B. Mini-computer
3. What do you call the programs that are C. Microcomputer
used to find out possible faults and their D. PDA
causes? E. None of these
A. operating system extensions
B. cookies Answer C. Microcomputer
C. diagnostic software
D. boot diskettes 9. Office LANs, which are scattered
E. None of these geographically on large scale, can be
connected by the use of corporate ______
Answer C. diagnostic software A. CAN
B. LAN
4. Which programming languages are C. DAN
classified as low-level languages? D. WAN
A. BASIC, COBOL, Fortran E. None of these
B. Prolog
C. C, C++ Answer D. WAN
D. Assembly languages
E. None of these 10. Where are data and programme stored
when the processor uses them?
Answer D. Assembly languages A. Main memory
B. Secondary memory
5. DMA stands for ______ C. Disk memory
A. Digital Memory Access
D. Programme memory D. 5
E. None of these E. None of these

Answer A. Main memory Answer A. 2.

6. What is a complex system that takes on


nearly complete responsibility for a task
eliminating the need for people,
verification, or decision making?
A. autonomous system.
Computer Questions Set – 07 B. encryption key.
C. audit control
1. The common name for the crime of D. cryptosystem.
stealing passwords is _______ E. None of these
A. spooling.
B. identity theft. Answer A. autonomous system.
C. spoofing.
D. hacking 7. ________ is a special type of program that
E. None of these is embedded in the web page to generate
the dynamic content.
Answer C. spoofing. A. hackers.
B. applets.
2. The scrambling of code is known as C. webjackers.
_______ D. keylogger
A. encryption. E. None of these
B. firewalling.
C. scrambling. Answer B. applets.
D. password-proofing
E. None of these 8. A_______ is a relatively simple and easy-
to-use software application
Answer A. encryption. A. hackers.
B. applets.
3. If you want to secure a message, use a(n) C. Software Widget
________ D. Bookmarklet
A. cryptology source. E. None of these
B. encryption key.
C. encryption software package. Answer C. Software Widget
D. cryptosystem.
E. None of these 9. A _______ is a bookmark stored in a web
browser that
Answer D. cryptosystem. contains JavaScript commands that add
new features to the browser.
4. Which of the following software monitors A. hackers.
and records computer transactions? B. applets.
A. cryptology source. C. Software Widget
B. encryption key. D. Bookmarklet
C. audit control E. None of these
D. cryptosystem.
E. None of these Answer D. Bookmarklet

Answer C. audit control. 10. Applet runs inside the browser and works
at ______ side.
5. Each individual who uses a public key A. Server
cryptosystem has _______ keys B. Client
A. 2 C. Primary
B. 3
C. 4
D. All of these 5. Hackers who hijack legitimate Web sites
E. None of these and redirect users to other sites are called
______
Answer B. Client A. hackers.
B. Trojan horses.
C. webjackers.
D. denial of service attackers.
E. None of these

Answer C. webjackers.

6. When a logic bomb is activated by a time-


Computer Questions Set – 08 related event, it is known as a ______
A. time-related bomb sequence.
1. A spyware and adware removal computer B. virus.
program is known as ______ C. time bomb.
A. Packet Sniffer D. Trojan horse
B. Rootkit E. None of these
C. Script Kiddie
D. Spybot Answer C. time bomb.
E. None of these
7. A(n) ______ attaches itself to documents
Answer D. Spybot that contain embedded programs that
automate tasks.
2. When you visit certain Web sites spyware A. hackers.
may be automatically downloaded. This is B. Trojan horses.
known as ______ C. webjackers.
A. virus. D. macro virus
B. spybot E. None of these
C. logic bomb.
D. drive-by download Answer D. macro virus
E. None of these
8. A microprocessor-controlled badge is
Answer D. drive-by download called a(n) ___________.
A. Super Badge
3. Software programs that close potential B. Passive Badge
security breaches in an operating system C. Active Badge
are known as ________ D. All of these
A. security breach fixes. E. None of these
B. refresh patches.
C. security repairs. Answer C. Active Badge
D. security patches
E. None of these 9. Special purpose hardware that will allow
every message to be encrypted is called
Answer D. security patches a(n) _______
A. Synchronization Processor
4. When customers of a Web site are unable B. Synchronous Processor
to access it due to a bombardment of fake C. Security Processor
traffic, it is known as _______ D. All of these
A. a virus. E. None of these
B. a Trojan horse.
C. cracking. Answer C. Security Processor
D. a denial of service attack.
E. None of these 10. Hardware or software designed to guard
against unauthorized access to a computer
Answer D. a denial of service attack. network is known as ______
A. hacker-proof program. 5. A simple device that physically links,
B. firewall. couples, or connects, two things together
C. hacker-resistant server. is known as ______
D. All of these A. Terminator
E. None of these B. Connector
C. Processor
Answer B. firewall. D. All of these
E. None of these

Answer B. Connector
Computer Questions Set – 09
6. A device that is used to transmit data
1. ______ usually refers to a terminal from one location to another is referred as
attached to a minicomputer or mainframe ______
and used to monitor the status of the A. Packet Sniffer
system. B. Rootkit
A. Machine C. Script Kiddie
B. Console D. Carrier
C. Equipment E. None of these
D. Emulator
E. None of these Answer D. Carrier

Answer B. Console 7. The total number of digits available to


represent numbers in a positional number
2. _____ typically enables the host system to system is referred as ______
run software or use peripheral devices A. Base
designed for the guest system. B. Power
A. Machine C. Number system
B. Console D. All of these
C. Equipment E. None of these
D. Emulator
E. None of these Answer A. Base

Answer D. Emulator 8. Programs developed by an outside


supplier and provided to the user in a
3. _______ is a computer program that machine readable form is known as
attempts to simulate an abstract model of ______
a particular system. A. Canned programs
A. Machine B. Beta program
B. Console C. Alpha program
C. Simulator D. All of these
D. Emulator E. None of these
E. None of these
Answer A. Canned programs
Answer C. Simulator
9. BISYNC stands for ____
4. A device attached to the end-points of a A. Binary Synchronization
bus network is known as ____ B. Binary Synchronous Communication
A. Terminator C. Binary Input/Output
B. Connector D. Binary Digit
C. Processor E. None of these
D. All of these
E. None of these Answer B. Binary Synchronous
Communication
Answer A. Terminator
10. A process of trying out a new product by D. All of these
independent users before it is finally E. None of these
manufactured/developed is known as
______ Answer B. Non-Resident virus
A. Alpha test
B. Beta Test 5. Executable Viruses are an example of
C. Gamma test ______
D. All of these A. Resident virus
E. None of these B. Non-Resident virus
C. Permanent virus
Answer B. Beta Test D. All of these
E. None of these

Answer B. Non-Resident virus


Computer Questions Set – 10
6. ______ is a computer program or piece of
1. Which of the following key is used to computer hardware that can intercept
refresh the web page/file? and log traffic that passes over a digital
A. F2 network or part of a network.
B. F5 A. Packet Sniffer
C. F3 B. Rootkit
D. F1 C. Script Kiddie
E. None of these D. All of these
E. None of these
Answer B. F5
Answer A. Packet Sniffer
F5 – Refresh the page/file.
Packet Sniffer is a computer program or
2. Which of the following key is used to piece of computer hardware that can
rename the file/icon? intercept and log traffic that passes over a
A. F2 digital network or part of a network.
B. F5
C. F3 7. A person who uses existing computer
D. F1 scripts or codes to hack into computers is
E. None of these known as ________
A. Packet Sniffer
Answer A. F2 B. Script Kiddie
F2 – Used to Rename the file/icon C. Blue Hat
D. White Hat
3. A program that remains in the memory E. None of these
while other programs are executing is
called _______ Answer B. Script Kiddie
A. Resident Program
B. Non-Resident Program 8. Packet Sniffer is also known as ______
C. Permanent Program A. Protocol Analyzer
D. All of these B. Ethernet Sniffer
E. None of these C. Wireless Sniffer
D. All of these
Answer A. Resident Program E. None of these

4. ____ is a computer virus that does not Answer D. All of these


store or execute itself from the
computer memory. 9. A ______ hacker is generally an employee
A. Resident virus of a software or computer company who
B. Non-Resident virus uses hacking skills to help test new
C. Permanent virus software prior to release.
A. Packet Sniffer
B. Script Kiddie 4. A device or power strip designed to
C. Blue Hat protect electronic equipment from power
D. White Hat surges and spikes is known as ______
E. None of these A. Surge Suppressors
B. Cluster
Answer C. Blue Hat C. Ping
D. Gateway
10. A ______ hacker is a computer security E. None of these
specialist who breaks into protected
systems and networks to test and assess Answer A. Surge Suppressors
their security.
A. Packet Sniffer 5. A utility that reduces the amount of
B. Script Kiddie fragmentation by physically organizing
C. Blue Hat the contents of the disk to store the pieces
D. White Hat of each file contiguously is known as
E. None of these _____
A. De-fragmentation
Answer D. White Hat B. Cluster
C. Data Mining
Computer Questions Set – 11 D. Data Inconsistency
E. None of these
1. A _____ is an automated program that
Answer A. De-fragmentation
runs over the Internet.
A. Hub
B. Jitter 6. Which of the following is a subset of
C. Ping the data warehouse?
A. Data Mining
D. Bot
E. None of these B. Data Maintenance
C. Data Mart
D. All of these
Answer D. Bot E. None of these
A Bot is an automated program that runs
over the Internet. Answer C. Data Mart
Data Mart is a subset of the data warehouse.
2. A network point that acts as an entrance
to another network is known as ________ 7. ______is a software application or set of
A. Hub related programs that are used to create
B. Jitter and manage digital content
C. Ping A. DNS
D. Gateway B. CMS
E. None of these C. ASP
D. All of these
Answer D. Gateway E. None of these
A network point that acts as an entrance to
another network is known as Gateway. Answer B. CMS

3. The Symbol/Illustration on desk pointing 8. The _______ provides the mechanism for
to a specific program is known as ______ opening, closing and managing
A. Icon a session between end-user application
B. Hotspot processes.
C. Menu A. Physical Layer
D. All of these B. Network Layer
E. None of these C. Session Layer
D. Presentation Layer
Answer A. Icon E. None of these
Answer C. Session Layer 3. Which of the following is a network device
that connects several nodes of a LAN?
9. ______ is the protocol layer that transfers A. Hub
data between adjacent network nodes in a B. Jitter
WAN or between nodes on the same LAN C. Ping
A. Datalink Layer D. All of these
B. Network Layer E. None of these
C. Session Layer
D. Presentation Layer Answer A. Hub
E. None of these
4. When a disk is formatted, it is divided
Answer A. Datalink Layer into tracks, and each track is divided into
______
10. Which of the following is a data link A. Sectors
protocol? B. Cluster
A. PPP C. Backup
B. HDLC D. All of these
C. Ethernet E. None of these
D. ADCCP
E. All of these Answer A. Sectors

Answer E. All of these 5. The computer’s hierarchy of storage


devices and folders is shown in
the _______
A. The Left pane
B. The Right pane
Computer Questions Set – 12 C. Finder
D. All of these
E. None of these
1. _______ is a basic Internet program that
allows a user to verify that a particular IP
address exists and can accept requests. Answer A. The Left pane
A. Hub
B. Jitter 6. The files and folders stored in the
C. Ping currently selected device or folder are
D. All of these shown in the _______
E. None of these A. The Left pane
B. The Right pane
Answer C. Ping C. Finder
D. All of these
Ping is a basic Internet program that allows a
E. None of these
user to verify that a particular IP address
exists and can accept requests Answer B. The Right pane
The files and folders stored in the currently
2. An abrupt and unwanted variation of
signals traveling over the Internet is selected device or folder are shown in the
known as _____ Right Pane.
A. Hub
B. Jitter 7. A group of sectors on a disk is known as
C. Ping ______
D. All of these A. Sectors
E. None of these B. Cluster
C. Backup
Answer B. Jitter
D. All of these
E. None of these
An abrupt and unwanted variation of signals
traveling over the Internet is known as Jitter.
Answer B. Cluster
8. When you are typing too fast, the data computer viruses found in memory, on
you type is stored in _______ area. storage media, or on incoming files is
A. Sectors known as ______
B. Buffer A. Anti-Virus Program
C. Secondary Memory B. Anti-Spam Program
D. All of these C. Adware
E. None of these D. Telnet
E. None of these
Answer B. Buffer
Answer A. Anti-Virus Program
9. A tool that allows an increase in the A program that protects a computer against
apparent size of an object is known as viruses by identifying and removing any
_______ computer viruses found in memory, on
A. Shading
storage media, or on incoming files is known
B. Intrusion Detection
C. Magnification as Anti Virus Program.
D. Hardware Vandalism
E. None of these 3. Computer file that records both successful
and unsuccessful access attempts is
known as _______
Answer C. Magnification
A. Anti-Virus Program
B. Anti-Spam Program
10. A digital multimedia file available on the C. Adware
Internet to be downloaded is known as D. Audit Trail
________ E. None of these
A. Bookmarks
B. Blogs
C. Podcasts Answer D. Audit Trail
D. All of these
E. None of these 4. Program or set of instructions in a
program that allows users to bypass
security controls when accessing a
Answer C. Podcasts
program or computer, or network is
known as ______
A. Anti-Virus Program
B. Anti-Spam Program
C. Back door
D. Audit Trail
E. None of these
Computer Questions Set – 13
Answer C. Back door
1. A Program that attempts to remove spam
before it reaches a user’s inbox is known 5. Web site that uses encryption techniques
as ______ to secure its data is known as _______
A. Anti-Virus Program A. Script Kiddie
B. Anti-Spam Program B. Secure Site
C. Adware C. Social Engineering
D. Telnet D. Data Mining
E. None of these E. None of these

Answer B. Anti-Spam Program Answer B. Secure Site


A Program that attempts to remove spam
6. Program that automatically analyzes all
before it reaches a user’s inbox is known
network traffic, assesses system
as Anti-Spam Program vulnerabilities is known as _____
A. Hardware Vandalism
2. Program that protects a computer against B. Pharming
viruses by identifying and removing any C. Intrusion Detection
D. Phishing Computer Questions Set – 14
E. None of these
1. ______ is a communication technology
Answer C. Intrusion Detection used by some incoming mail servers.
Program that automatically analyzes all A. TCP
network traffic, assesses system B. POP
vulnerabilities is known as Intrusion C. FTP
Detection Software. D. Telnet
E. None of these
7. A type of resource leak that occurs when
a computer program incorrectly manages Answer B. POP
memory allocations is known as ______ POP is a communication technology used by
A. Memory Leak some incoming mail servers
B. Intrusion Detection
C. Pharming 2. In POP protocol, O stands for _______
D. Hardware Vandalism A. Operation
E. None of these B. Office
C. Ordinary
Answer A. Memory Leak D. One
E. None of these
8. _____ is an attack that sends unsolicited
messages to Bluetooth-enabled devices. Answer B. Office
A. Memory Leak POP – Post Office Protocol
B. Intrusion Detection
C. Blue Jacking 3. ________ is the exploitation of a
D. Hardware Vandalism vulnerability in domain name servers that
E. None of these allows traffic to a website to be redirected
to another website.
Answer C. Blue Jacking A. Phishing
B. Pharming
9. The act of defacing or destroying C. Protocol
computer equipment is known as _______ D. All of these
A. Memory Leak E. None of these
B. Intrusion Detection
C. Blue Jacking Answer B. Pharming
D. Hardware Vandalism
E. None of these 4. ___________ is the code of acceptable
behaviours users should follow while on
Answer D. Hardware Vandalism the Internet.
A. SMTP
10. A cookie that was not created by the B. Netiquette
website that attempts to access it is known C. FTP
as _____ D. All of these
A. First Party Cookie E. None of these
B. Second Party Cookie
C. Third Party Cookie Answer B. Netiquette
D. Intrusion Detection
E. None of these 5. Many e-commerce sites use _____ to
determine customer preferences.
Answer C. Third Party Cookie A. Data Redundancy
B. Data Integrity
C. Data Attribute
D. Data Mining
E. None of these

Answer D. Data Mining


6. A map of a database is called a
__________
A. Data Redundancy
B. Schema Computer Questions Set – 15
C. Data Attribute
D. Data Entry Errors 1. Which of the following is the standard
E. None of these way that computer users share files across
corporate intranets and the Internet?
Answer B. Schema A. Network File System(NFS)
A map of a database is called a Schema B. Common Internet File System (CIFS)
C. File Sharing System
7. Elimination of data redundancy does not D. All of these
solve _____ E. None of these
A. Data Inconsistency
B. Data Integrity Answer B. Common Internet File
C. Data Attribute System(CIFS)
D. Data Entry Errors Common Internet File System (CIFS) is the
E. None of these
standard way that computer users share files
across corporate intranets and the Internet
Answer D. Data Entry Errors
2. Which of the following allows remote
8. If a program exceeds its allocated space, hosts to mount file systems over a
the OS uses an area of the hard disk, network?
called ____________ , to store parts of A. Network File System(NFS)
programs or data files until they are B. Common Internet File System (CIFS)
needed. C. File Sharing System
A. Main Memory D. All of these
B. Secondary Memory E. None of these
C. Virtual Memory
D. All of these
E. None of these Answer A. Network File System(NFS)
Network File System(NFS) allows remote
Answer C. Virtual Memory hosts to mount file systems over a network.

9. Some viruses are hidden in _____, which 3. _______ is a simple, lock-step FTP that
are instructions saved in an application allows a client to get a file from or put a
such as a word processing or spreadsheet file onto a remote host.
program. A. SSH FTP
A. Micros B. Trivial FTP
B. Macros C. FTP
C. Data D. All of these
D.All of these E. None of these
E.None of these
Answer B. Trivial FTP
Answer B. Macros
4. FTP which uses the Secure Shell protocol
10. _______ occurs when a file is broken up to transfer files is known as _______
into pieces to fit on the disk A. SSH FTP
A. Program counter B. Trivial FTP
B. Disk Fragmentation C. FTP
C. Data Attribute D. All of these
D. Data Entry Errors E. None of these
E. None of these
Answer A. SSH FTP
Answer B. Disk Fragmentation
5. _______ is used to store
custom data private to the page or
application. processor register known as _______
A. Data Redundancy A. Program counter
B. Data Integrity B. instruction register
C. Data Attribute C. accumulator
D. All of these D. All of these
E. None of these E. None of these

Answer C. Data Attribute Answer C. accumulator

6. _______ is the maintenance of, and the Computer Questions Set – 16


assurance of the accuracy and consistency
of, data over its entire life-cycle
1. ______ is a device that translates sound
A. Data Redundancy
vibrations in the air into electronic
B. Data Integrity
signals.
C. Data Attribute
A. Hub
D. Data Inconsistency
B. Switch
E. None of these
C. Microphone
D. All of these
Answer B. Data Integrity E. None of these
Data Integrity is the maintenance of, and the
assurance of the accuracy and consistency Answer C. Microphone
of, data over its entire life-cycle A microphone is a device that translates
sound vibrations in the air into electronic
7. ________ occur between files when signals.
similar data is kept in different formats in
two different files.
2. _____ is a collection of internet-connected
A. Data Redundancy
devices that are infected and controlled by
B. Data Integrity
a common type of malware.
C. Data Attribute
A. Hub
D. Data Inconsistency
B. Switch
E. None of these
C. Microphone
D. Botnet
Answer D. Data Inconsistency E. None of these

8. Attributes can be defined for _____ Answer D. Botnet


A. Pages
B. Entity Botnet is a collection of internet-connected
C. Macro devices that are infected and controlled by a
D. All of these common type of malware.
E. None of these
3. _______ is a type of malicious
Answer B. Entity software program whose primary
function is to infect other computers while
9. Which one of the following is a remaining active on infected systems.
cryptographic protocol used to secure A. Computer Worm
http concession? B. Ethical Worm
A.Transport Layer Security C. Bot Worm
B.Explicit Congestion Notification D. IM Worm
C.Resource Reservation Notification(RRN) E. None of these
D.All of these
E.None of these Answer A. Computer Worm

Answer A.Transport Layer Security 4. _________ may be used to infect


computers and turn them into zombies or
10. The load instruction is mostly used to bots.
designate a transfer from memory to a A. Computer Worm
B. Ethical Worm combined data sets for data processing.
C. Bot Worm A. Data Storage
D. IM Worm B. Data Aggregation
E. None of these C. In-memory Cookie
D. Tracking Cookie
Answer C. Bot Worm E. None of these

5. _______ propagate through instant Answer B. Data Aggregation


messaging services and exploit access to
contact lists on victim computers. 10. _____ is a repository of data that is
A. Computer Worm designed to serve a particular community
B. Ethical Worm of knowledge workers.
C. Bot Worm A. Data mart
D. IM Worm B. Data Aggregation
E. None of these C. Data Maintenance
D. All of these
Answer D. IM Worm E. None of these

6. _______ is software that aims to gather Answer A. Data mart


information about a person or
organization without their knowledge.
A. Spyware
B. Adware
C. Malware Computer Questions Set – 17
D. All of these
E. None of these 1. A memory management unit (MMU) that
fetches page table entries from main
Answer A. Spyware memory has a _____, used for recording
Spyware is software that aims to gather the results of the virtual
address to physical address translations.
information about a person or organization
A. Disk Cache
without their knowledge. B. Web Cache
C. Distributed Cache
7. A _____ refers to the component of a D. Translation Lookaside Buffer
computer virus that executes a malicious E. None of these
activity
A. Payload Ans – D. Translation Lookaside Buffer
B. Phishing A memory management unit (MMU) that
C. Pharming fetches page table entries from main
D. All of these memory has a Translation Lookaside Buffer
E. None of these used for recording the results of the virtual
address to physical address translations.
Answer A. Payload
2. Which of the following is an example of
8. ______ is a type of software that is Disk Cache?
distributed free of charge to prospective A. Page Cache
customers in a limited format. B. Web Cache
A. Spyware C. Distributed Cache
B. Adware D. Translation Lookaside Buffer
C. Malware E. None of these
D. Shareware
E. None of these Ans – A. Page Cache
The page cache in main memory, which is
Answer D. Shareware an example of disk cache

9. ________ is the compiling of information 3. Web browsers and web proxy servers
from databases with intent to prepare employ ______ to store previous responses
from web servers, such as web pages and 8. _______ is a technique in which
images an Operating System collects the
A. Page Cache programs and data together in
B. Web Cache a batch before processing starts.
C. Distributed Cache A. P2P Caching
D. Translation Lookaside Buffer B. Database Caching
E. None of these C. Distributed Cache
D. Batch Processing
Ans – B. Web Cache E. None of these

4. A ______ uses networked hosts to provide Ans – D. Batch Processing


scalability, reliability and performance to
the application 9. ________ that hasn’t been used or
A. Page Cache accessed recently
B. Web Cache A. Hot Buffer
C. Distributed Cache B. Cold Buffer
D. Translation Lookaside Buffer C. In-memory Cookie
E. None of these D. Tracking Cookie
E. Secure Cookie
Ans – C. Distributed Cache
Ans – B. Cold Buffer
5. Another form of cache is ________, where
the files most sought for by peer-to- 10. _____ is the process of expanding a non-
peer applications are stored in specific file name containing a wildcard
an ISP cache to accelerate P2P transfers. character into a set of specific file names
A. P2P Caching that exist in storage on a computer,
B. Database Caching server, or network.
C. Distributed Cache A. Database Caching
D. Translation Lookaside Buffer B. Globbing
E. None of these C. Hot Buffer
D. Secure Cookie
Ans – A. P2P Caching E. None of these

6. Which of the following can substantially Ans – B. Globbing


improve the throughput
of database application? Computer Questions Set – 18
A. P2P Caching
B. Database Caching
1. _______ is a small piece of data sent from
C. Distributed Cache
a website and stored on the user’s
D. Translation Lookaside Buffer
computer by the user’s web browser while
E. None of these
the user is browsing
A. Cache
Ans – B. Database Caching B. Tracking
Database Caching can substantially improve
C. Cookie
the throughput of a database application.
D. Server Free Backup
E. None of these
7. A(n) ______ OS manages a group of
distinct computers and makes them Ans – C. Cookie
appear to be a single computer. Cookie is a small piece of data sent from a
A. Templated website and stored on the user’s computer by
B. Embedded
the user’s web browser while the user is
C. Real-Time browsing
D. Distributed
E. None of these
2. Which of the following is a cookie that is
automatically recreated after being
Ans – D. Distributed
deleted?
A. Super Cookie
B. HTTP only Cookie D. Tracking Cookie
C. Zombie Cookie E. Secure Cookie
D. Session Cookie
E. None of these Ans – E. Secure Cookie

Ans – C. Zombie Cookie 8. ________is a cookie with an origin of


Zombie Cookie is a cookie that is a top-level domain
automatically recreated after being deleted A. Super Cookie
B. Transient Cookie
3. ________ exists only in temporary C. In-memory Cookie
memory while the user navigates the D. Tracking Cookie
website. E. Secure Cookie
A. Super Cookie
B. HTTP only Cookie Ans – A. Super Cookie
C. Zombie Cookie
D. Session Cookie 9. ________ cannot be accessed by client-
E. None of these side APIs, such as JavaScript.
A. Super Cookie
Ans – D. Session Cookie B. HTTP Cookie
C. In-memory Cookie
4. Session Cookie is also known as ____. D. Tracking Cookie
A. Super Cookie E. Secure Cookie
B. Transient Cookie
C. In-memory Cookie Ans – B. HTTP Cookie
D. Both (A) and (B)
E. Both (B) and (C) 10. A cookie consists of ______
A. Name
Ans – E. Both (B) and (C) B. Value
C. Zero or More Attributes
5. ______ expires at a specific date or after a D. All of these
specific length of time E. None of these
A. Super Cookie
B. Persistent Cookie Ans – D. All of these
C. Zombie Cookie
D. Session Cookie
E. None of these

Ans – B. Persistent Cookie


Computer Questions Set – 19
1. Which of the following is the process of
6. Persistent cookies are sometimes referred
backing up server data to a centralized
to as ______
A. Super Cookie storage device rather than moving it
B. Transient Cookie across a LAN?
A. Cold Backup
C. In-memory Cookie
B. Hot Backup
D. Tracking Cookie
C. LAN Free Backup
E. Both (B) and (C)
D. Server Free Backup
E. None of these
Ans – D. Tracking Cookie
Persistent cookies are sometimes referred to
as Tracking Cookies. Ans – C. LAN Free Backup
LAN-free backup is the process of backing
up server data to a centralized storage device
7. A _________ can only be transmitted over
rather than moving it across a local-area
an encrypted connection
network (LAN)
A. Super Cookie
B. Transient Cookie
C. In-memory Cookie 2. Backup that is going to be done outside of
the server is known as ______
A. Cold Backup
B. Hot Backup C. Warm Backup
C. LAN Free Backup D. Server Free Backup
D. Server Free Backup E. None of these
E. None of these
Ans – C. Warm Backup
Ans – D. Server Free Backup
Backup that is going to be done outside of 8. Which of the following is a large scale
the server is known as Server Free Backup monetary theft conducted through
computer hacking, the online equivalent
3. ______ is a database backup during which of the real-world bank heist?
the database is offline and not accessible A. Spoofing
to updates. B. Cyber heist
A. Cold Backup C. Phishing
B. Hot Backup D. Plagiarism
C. Warm Backup E. None of these
D. Server Free Backup
E. None of these Ans – B. Cyber heist

Ans – A. Cold Backup 9. ________ is an email-spoofing attack that


targets a specific organization or
4. A cold backup is also known as ____. individual, seeking unauthorized access to
A. Online Backup sensitive information.
B. Offline Backup A. Malware
C. LAN Free Backup B. Cyber heist
D. Server Free Backup C. Spear Phishing
E. None of these D. Plagiarism
E. None of these
Ans – B. Offline Backup
Ans – C. Spear Phishing
5. ______ is a backup performed on data
while the database is actively online and 10. _______ is a form of computer security
accessible to users. hacking in which corrupt DNS data is
A. Cold Backup introduced into the DNS resolver’s cache,
B. Hot Backup causing the name server to return an
C. Warm Backup incorrect IP address.
D. Server Free Backup A. ARP Spoofing
E. None of these B. DNS Spoofing
C. IP Spoofing
Ans – B. Hot Backup D. All of these
E. None of these
6. A Hot Backup is also known as ______
A. Online Backup Ans – B. DNS Spoofing
B. Offline Backup
C. Dynamic Backup Computer Questions Set – 20
D. Both (B) and (C)
E. Both (A) and (C)
1. ______ is a small-scale data center or
cluster of computers designed to provide
Ans – E. Both (A) and (C) cloud computing services to mobile
A Hot Backup is also known as Online
devices.
Backup or Dynamic Backup.
A. Sub
B. Intelligent
7. Which of the following is a C. Drone
technique where all the tables are locked D. Cloudlet
and users cannot access at the time of E. None of these
backing up data?
A. Cold Backup
Ans – D. Cloudlet
B. Hot Backup
A cloudlet is a small-scale data center or
cluster of computers designed to quickly B. IoT Gateway
provide cloud computing services to mobile C. IoT Middleware
devices, such as smartphones, tablets and D. IoT Cloud
wearable devices, within close geographical E. Both (A) and (C)
proximity
Answer
2. ______ is an exploit that takes advantage
of a vulnerable device to gain access to Ans – C. IoT Middleware
a network. IoT Middleware is software that serves as an
A. Device Attack interface between components of the IoT.
B. Edge Computing
C. Drone 7. ______ is a group of hacked computers,
D. Cloudlet smart appliances, and Internet-connected
E. None of these devices that have been co-opted for illicit
purposes.
Ans – A. Device Attack A. IoT Botnet
Device Attack is an exploit that takes B. IoT Gateway
advantage of a vulnerable device to gain C. IoT Middleware
access to a network. D. IoT Cloud
E. Both (A) and (C)
3. ______ is the exploiting of vulnerabilities
in embedded software to gain control of Ans – A. IoT Botnet
the device.
A. Proxy Hacking 8. _________ is a larger transmission line
B. Embedded Device Hacking that carries data gathered from smaller
C. Proxy Hijacking lines that interconnect with it.
D. Embedded Firmware A. Backbone
E. Both (A) and (C) B. Intelligent
C. Drone
Ans – B. Embedded Device Hacking D. Cloudlet
E. None of these
4. _______ is the flash memory chip that
stores specialized software running on a Ans – A. Backbone
chip in an embedded device to control its
functions. 9. Which of the following is the combination
A. Proxy Hacking of Bridge and Router?
B. Embedded Device Hacking A. Backbone
C. Proxy Hijacking B. Brouter
D. Embedded Firmware C. Baseband
E. Both (A) and (C) D. Cloudlet
E. None of these
Ans – D. Embedded Firmware
Ans – B. Brouter
5. _______ is a device which serves as the
connection point between IoT devices and 10. Which of the following forwards packets
the cloud to computer hosts within a network but
A. IoT Botnet not between networks?
B. IoT Gateway A. Edge Router
C. IoT Middleware B. Core Router
D. IoT Cloud C. Backbone
E. Both (A) and (C) D. All of these
E. None of these
Ans – B. IoT Gateway
Ans – B. Core Router
6. ________ is software that serves as an
interface between components of the IoT.
A. IoT Botnet

Das könnte Ihnen auch gefallen