Beruflich Dokumente
Kultur Dokumente
F9
Computer Questions Set –
5. What is the shortcut key for “Find and
(181, 182, 183, 184, 185, 186, Replace” dialog box?
187, 188, 189, 190, 192, 193, A. Ctrl + F
B. Ctrl + R
194, 195, 196, 197, 198, 199, C. Ctrl + H
D. Ctrl+Shift + F
200, 201) E. None of these
Answer C. Ctrl + H
1. What do you call the programs that are 6. Which of the following is the smallest
used to find out possible faults and their storage?
causes? A. Megabyte
A. operating system extensions B. Gigabyte
B. cookies C. Terabyte
C. diagnostic software D. All of these
D. boot diskettes E. None of these
E. None of these
Answer A. Megabyte.
Answer C. diagnostic software
7. Hardware or software designed to guard
2. The ability to recover and read deleted or against unauthorized access to a computer
damaged files from a criminal’s computer network is known as a(n) ________
is an example of a law enforcement A. Hacker-proof program.
speciality called _______ B. Firewall.
A. robotics C. Hacker-resistant server.
B. simulation D. Encryption safe wall.
C. computer forensics E. None of these
D. animation
E. None of these Answer B. Firewall.
Answer C. audit control. 10. Applet runs inside the browser and works
at ______ side.
5. Each individual who uses a public key A. Server
cryptosystem has _______ keys B. Client
A. 2 C. Primary
B. 3
C. 4
D. All of these 5. Hackers who hijack legitimate Web sites
E. None of these and redirect users to other sites are called
______
Answer B. Client A. hackers.
B. Trojan horses.
C. webjackers.
D. denial of service attackers.
E. None of these
Answer C. webjackers.
Answer B. Connector
Computer Questions Set – 09
6. A device that is used to transmit data
1. ______ usually refers to a terminal from one location to another is referred as
attached to a minicomputer or mainframe ______
and used to monitor the status of the A. Packet Sniffer
system. B. Rootkit
A. Machine C. Script Kiddie
B. Console D. Carrier
C. Equipment E. None of these
D. Emulator
E. None of these Answer D. Carrier
3. The Symbol/Illustration on desk pointing 8. The _______ provides the mechanism for
to a specific program is known as ______ opening, closing and managing
A. Icon a session between end-user application
B. Hotspot processes.
C. Menu A. Physical Layer
D. All of these B. Network Layer
E. None of these C. Session Layer
D. Presentation Layer
Answer A. Icon E. None of these
Answer C. Session Layer 3. Which of the following is a network device
that connects several nodes of a LAN?
9. ______ is the protocol layer that transfers A. Hub
data between adjacent network nodes in a B. Jitter
WAN or between nodes on the same LAN C. Ping
A. Datalink Layer D. All of these
B. Network Layer E. None of these
C. Session Layer
D. Presentation Layer Answer A. Hub
E. None of these
4. When a disk is formatted, it is divided
Answer A. Datalink Layer into tracks, and each track is divided into
______
10. Which of the following is a data link A. Sectors
protocol? B. Cluster
A. PPP C. Backup
B. HDLC D. All of these
C. Ethernet E. None of these
D. ADCCP
E. All of these Answer A. Sectors
9. Some viruses are hidden in _____, which 3. _______ is a simple, lock-step FTP that
are instructions saved in an application allows a client to get a file from or put a
such as a word processing or spreadsheet file onto a remote host.
program. A. SSH FTP
A. Micros B. Trivial FTP
B. Macros C. FTP
C. Data D. All of these
D.All of these E. None of these
E.None of these
Answer B. Trivial FTP
Answer B. Macros
4. FTP which uses the Secure Shell protocol
10. _______ occurs when a file is broken up to transfer files is known as _______
into pieces to fit on the disk A. SSH FTP
A. Program counter B. Trivial FTP
B. Disk Fragmentation C. FTP
C. Data Attribute D. All of these
D. Data Entry Errors E. None of these
E. None of these
Answer A. SSH FTP
Answer B. Disk Fragmentation
5. _______ is used to store
custom data private to the page or
application. processor register known as _______
A. Data Redundancy A. Program counter
B. Data Integrity B. instruction register
C. Data Attribute C. accumulator
D. All of these D. All of these
E. None of these E. None of these
9. ________ is the compiling of information 3. Web browsers and web proxy servers
from databases with intent to prepare employ ______ to store previous responses
from web servers, such as web pages and 8. _______ is a technique in which
images an Operating System collects the
A. Page Cache programs and data together in
B. Web Cache a batch before processing starts.
C. Distributed Cache A. P2P Caching
D. Translation Lookaside Buffer B. Database Caching
E. None of these C. Distributed Cache
D. Batch Processing
Ans – B. Web Cache E. None of these