Sunday, 9 December 2012


Q.The term 'PC-XT' refers to
 1Personal Computer External Technology
 2Personal Computer Extended Technology
 3Personal Computer Embedded Technology
 4Personal Computer Expanded Technology
  Ans: 2
Q.Most networks employ devices for routing services. Routers work at which of the Following OSI Layers?
  Ans: 2
Q.Which of the following will help you to improve your LAN security?
 1Change your passwords frequently
 2Install a firewall program
 3Use a proxy
 4All of the above
  Ans: 3
Q.Which of the following devices discriminates between multicast and unicast packets?
 1Multicast switch
 2Bicast switch
 3Bicast router
 4Mulicast Router
  Ans: 4
Q.Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number?
 1Application layer Firewall
 2Packet Filtering Firewall
 3Router enhanced firewall
 4IP enabled firewall
  Ans: 2
Q.Which of the following systems run an application layer firewall using proxy software?
 1Proxy NAT
 2Proxy client
 3Client 32
 4Proxy server
  Ans: 4
Q.A packet filtering firewall operates at which of the following OSI layer?
 1At the Application layer
 2At the Transport Layer
 3At the Network Layer
 4Both 2 and 3
  Ans: 4
Q.Which of the following are true about firewalls?
 1Filters network traffic
 2Can be either a hardware or software device
 3Follows a set of rules
 4All the above
  Ans: 4
Q.What are some of the benefits of using a firewall for your LAN?
 1Increased access to Instant Messaging
 2Stricter access control to critical resources
 3Greater security to your LAN
 4Both 2 and 3
  Ans: 4
Q.Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server?
 1DSL modem
 2A multi-homed firewall
 4A brouter that acts both as a bridge and a router
  Ans: 2


Q.There are several primary categories of procedures. Which of the following is not a primary category of procedures?
 2Backup and recovery
 3Firewall development
  Ans: 3
Q.All of the logic and mathematical calculations done by the computer happen in/on the -
 1Central processing unit
 2Mother board
 4Central control unit
  Ans: 1
Q.The connection between your computer at home and your local ISP is called -
 1The last mile
 2The home Stretch
 3The home page
 4The backbone
  Ans: 3
Q.When speaking of computer input and output, input refers to -
 1any data processing that occurs from new data input into the computer
 2data or information that has been entered into the computer
 3the transmission of data that has been input into the computer
 4Both (C) and (D) above.
  Ans: 4
Q.Computer software can be defined as--
 1the computer and its associated equipment
 2the instructions that tell the computer what to do
 3computer components that act to accomplish a goal
 4an interface between the computer and the network
  Ans: 2
Q.The main memory of a computer can also be called -
 1Primary storage
 2Internal memory
 3Primary memory
 4All of these
  Ans: 3

Q.Which of the following is an example of an optical disk?
 1Magnetic disks
 2Memory disks
 3Data bus disks
 4Digital versatile disks
  Ans: 4
Q.Which of the following is an example of storage devices?
 1Magnetic disks
 4All of these
  Ans: 4
Q.A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a -
  Ans: 1
Q.A popular way to learn about computers without ever going to a classroom is called -
 2isolated learning
 4close learning
  Ans: 3
Q.Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information -
 1Floppy diskette
 2Hard disk
 3Permanent disk
 4None of these
  Ans: 2
Q.A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using -
 1Input automation
 2Item data automation
 3Scanning automation
 4Source data automation
  Ans: 3
Q.Main memory works in conjunction with -
 2Special function cards
  Ans: 3
Q.The collection of links throughout the Internet creates an interconnected network called the -
 3World Wide Web
 4All of the above
  Ans: 4
Q.Cache and main memory will lose their contents when the power is off. They are--
  Ans: 3
Q.Vendor-created program modifications are called--
  Ans: 2

Q......are attempts by individuals to obtain confidential information from you by falsifying their identity.
 1Phishing trips
 2Computer viruses
 3Spyware scams
 4Phishing Scams
  Ans: 4
Q.The main job of CPU is to -
 1carry out program instructions
 2Store data/information for future use
 3Process data and information
 4Both (A) and (C)
  Ans: 4
Q.where are programs and data to be used by the computer available?
 2Processing unit
  Ans: 4
Q.A parallel port is most often used by a -
 4External storage device
  Ans: 3
Q.Computer follows a simple principle called GIGO which means:
 1Garbage in garbage out
 2Garbage input good output
 3Good input good output
 4Greater instructions greater output
  Ans: 1
Q.Arrange the following devices in ascending order of the speed: A. RAM B. Hard disk C. Cache D. Floppy
  Ans: 3
Q.What is the commonly used unit for measuring the sped of data transmission?
 1Bits per second
 2Nano seconds
 3Characters per second
 4Mega Hertz
  Ans: 1
Q.Which one among the following is not included in the basic functions of operating system?
 1Job Control
 2Job Scheduling
 3Memory Management
 4Data Management
  Ans: 1
Q.'Blue tooth' technology allows -
 1Landline phone to mobile phone communication
 2Signal transmission on mobile phones only
 3Wireless communication between equipments
 4Satellite television communication
  Ans: 3
Q.Which of the following statements about the Crime and Criminal Tracking Network System (CCTNS) is/are correct?
1. It will facilitate real time access of classified criminal data to the law enforcement authorities.
2. National Crime Record Bureau is the nodal agency mandated to implement the network in all the states.
Select the correct answer using the code given below-
 11 only
 22 only
 3Both 1 and 2
 4Neither 1 nor 2
  Ans: 1
Q.One byte consists of
 1four bits
 2one bit
 3ten bit
 4eight bits
  Ans: 4

Q.Storage media such as a CD read and write information using --
 1Magnetic strips
 2Magnetic dots
 3A laser beam of red light
 4All of these
  Ans: 4
Q.To reload a Web page, press the.... button.
  Ans: 4
Q.The.... controls a client computer's resources.
 1Application program
 2Instruction set
 3Operating System
 4Server application
  Ans: 4
Q.The process of transferring files from a computer on the Internet to your computer is called--
  Ans: 1
Q.Which media have the ability to have data/information stored (written) on them by users more than once?
 1CD-R disks
 2CD-RW disks
 3Zip disks
 4Optical Disks
  Ans: 2
Q.What are the four things needed to connect to the Internet?
 1Telephone line, modem, computer, and an ISP
 2Modem, computer, PDA and ISP
 3Telephone line, PDA, modem and computer
 4monitor, keyboard, mouse, modem
  Ans: 1
Q.What is e-commerce?
 1Buying and selling products and services over the Internet
 2Buying and selling international goods
 3Buying and selling products and services not found in stores
 4Buying and selling products having to do with computers
  Ans: 1
Q.Storage and memory differ with respect to which of the following characteristics?
 4All of these
  Ans: 4
Q.The ---- is the term used to describe the window that is currently being used.
 1Web Window
 2Display Area
 3Active Window
  Ans: 3
Q.Which of the following devices is specially designed to forward packets to specific ports based on the packet's address?
 1Specialty hub
 2Switching hub
 3Port hub
 4Filtering hub
  Ans: 2
Q.After booting process which file executes automatically
  Ans: 3
Q.A System in which a transaction access and updates a file quickly enough to affect the original decision making is called
 1Real time system
 2time sharing system
 3both of above
 4None of above
  Ans: 1
Q.In time sharing system, the user carried a conversation with the central system called
 1interacting computer
 2conversation computing
 3Both of above
 4None of above
  Ans: 3
Q.The principle of time sharing is
 1large numbers of users direct access to the computer for problem solving
 2large number of user for file sharing
 3both of above
  Ans: 1
Q.Allocation of a resources in a time dependent fashion to several program simultaneously called
 1multi tasking
 2multi user
 3time sharing
  Ans: 3
Q.Batch processing is also known as
 3off line processing
 4all of above
  Ans: 4
Q.Operating System for Microcomputer system is-
  Ans: 1
Q.Data are accumulated and processed in group called
 1Batch Processing
 2Group processing
 3Time sharing
  Ans: 1

Q.Macintosh computer use_____ Multitasking
  Ans: 2
Q.Preemptive and cooperative both are type of
  Ans: 2
Q.Multiprocessing supports more then one_____ at the same time
  Ans: 1
Q.Which one allow two or more users to run programs at the same time
  Ans: 1
Q.DMA stands for ________
 1Direct Memory Access
 2Distinct Memory Access
 3Direct Module Access
 4Direct Memory Allocation
  Ans: 1
Q.Which of the following is a read only memory storage device.
 1Floppy Disk
 2Hard Disk
 4None of these
  Ans: 3
Q._________ is a semi conductor memory.
 4Both a & b
  Ans: 4
Q.Separate Read/Write heads are required in which of these memory access schemes.
 1Random Access
 2Sequential Access
 3Direct Access
 4None of these
  Ans: 4
Q.Which of the following are the best units of data on an external storage device?
 4Clock cycles
  Ans: 2
Q.In a Computer_________ is capable to store single binary bit.
 2Flip Flop
  Ans: 2

No comments: