Sunday, 9 December 2012

COMPUTER KNOWLEDGE PART-1

Q.The term 'PC-XT' refers to
 1Personal Computer External Technology
 2Personal Computer Extended Technology
 3Personal Computer Embedded Technology
 4Personal Computer Expanded Technology
  Ans: 2
Q.Most networks employ devices for routing services. Routers work at which of the Following OSI Layers?
 1Transport
 2Network
 3Presentation
 4Session
  Ans: 2
Q.Which of the following will help you to improve your LAN security?
 1Change your passwords frequently
 2Install a firewall program
 3Use a proxy
 4All of the above
  Ans: 3
Q.Which of the following devices discriminates between multicast and unicast packets?
 1Multicast switch
 2Bicast switch
 3Bicast router
 4Mulicast Router
  Ans: 4
Q.Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number?
 1Application layer Firewall
 2Packet Filtering Firewall
 3Router enhanced firewall
 4IP enabled firewall
  Ans: 2
Q.Which of the following systems run an application layer firewall using proxy software?
 1Proxy NAT
 2Proxy client
 3Client 32
 4Proxy server
  Ans: 4
Q.A packet filtering firewall operates at which of the following OSI layer?
 1At the Application layer
 2At the Transport Layer
 3At the Network Layer
 4Both 2 and 3
  Ans: 4
Q.Which of the following are true about firewalls?
 1Filters network traffic
 2Can be either a hardware or software device
 3Follows a set of rules
 4All the above
  Ans: 4
Q.What are some of the benefits of using a firewall for your LAN?
 1Increased access to Instant Messaging
 2Stricter access control to critical resources
 3Greater security to your LAN
 4Both 2 and 3
  Ans: 4
Q.Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server?
 1DSL modem
 2A multi-homed firewall
 3VLAN
 4A brouter that acts both as a bridge and a router
  Ans: 2

 

Q.There are several primary categories of procedures. Which of the following is not a primary category of procedures?
 1Testing
 2Backup and recovery
 3Firewall development
 4Design
  Ans: 3
Q.All of the logic and mathematical calculations done by the computer happen in/on the -
 1Central processing unit
 2Mother board
 3Memory
 4Central control unit
  Ans: 1
Q.The connection between your computer at home and your local ISP is called -
 1The last mile
 2The home Stretch
 3The home page
 4The backbone
  Ans: 3
Q.When speaking of computer input and output, input refers to -
 1any data processing that occurs from new data input into the computer
 2data or information that has been entered into the computer
 3the transmission of data that has been input into the computer
 4Both (C) and (D) above.
  Ans: 4
Q.Computer software can be defined as--
 1the computer and its associated equipment
 2the instructions that tell the computer what to do
 3computer components that act to accomplish a goal
 4an interface between the computer and the network
  Ans: 2
Q.The main memory of a computer can also be called -
 1Primary storage
 2Internal memory
 3Primary memory
 4All of these
  Ans: 3


 
Q.Which of the following is an example of an optical disk?
 1Magnetic disks
 2Memory disks
 3Data bus disks
 4Digital versatile disks
  Ans: 4
Q.Which of the following is an example of storage devices?
 1Magnetic disks
 2Tapes
 3DVDs
 4All of these
  Ans: 4
Q.A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a -
 1Hacker
 2Spammer
 3Analyst
 4Programmer
  Ans: 1
Q.A popular way to learn about computers without ever going to a classroom is called -
 1i-learning
 2isolated learning
 3e-learning
 4close learning
  Ans: 3
Q.Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information -
 1Floppy diskette
 2Hard disk
 3Permanent disk
 4None of these
  Ans: 2
Q.A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using -
 1Input automation
 2Item data automation
 3Scanning automation
 4Source data automation
  Ans: 3
Q.Main memory works in conjunction with -
 1RAM
 2Special function cards
 3CPU
 4Intel
  Ans: 3
Q.The collection of links throughout the Internet creates an interconnected network called the -
 1WWW
 2Web
 3World Wide Web
 4All of the above
  Ans: 4
Q.Cache and main memory will lose their contents when the power is off. They are--
 1Dynamic
 2Faulty
 3Volatile
 4Static
  Ans: 3
Q.Vendor-created program modifications are called--
 1Patches
 2Fixes
 3Holes
 4Overlaps
  Ans: 2


Q......are attempts by individuals to obtain confidential information from you by falsifying their identity.
 1Phishing trips
 2Computer viruses
 3Spyware scams
 4Phishing Scams
  Ans: 4
Q.The main job of CPU is to -
 1carry out program instructions
 2Store data/information for future use
 3Process data and information
 4Both (A) and (C)
  Ans: 4
Q.where are programs and data to be used by the computer available?
 1Output
 2Processing unit
 3Input
 4Storage
  Ans: 4
Q.A parallel port is most often used by a -
 1Mouse
 2Monitor
 3Printer
 4External storage device
  Ans: 3
Q.Computer follows a simple principle called GIGO which means:
 1Garbage in garbage out
 2Garbage input good output
 3Good input good output
 4Greater instructions greater output
  Ans: 1
Q.Arrange the following devices in ascending order of the speed: A. RAM B. Hard disk C. Cache D. Floppy
 1ABDC
 2BDAC
 3DBAC
 4BADC
  Ans: 3
Q.What is the commonly used unit for measuring the sped of data transmission?
 1Bits per second
 2Nano seconds
 3Characters per second
 4Mega Hertz
  Ans: 1
Q.Which one among the following is not included in the basic functions of operating system?
 1Job Control
 2Job Scheduling
 3Memory Management
 4Data Management
  Ans: 1
Q.'Blue tooth' technology allows -
 1Landline phone to mobile phone communication
 2Signal transmission on mobile phones only
 3Wireless communication between equipments
 4Satellite television communication
  Ans: 3
Q.Which of the following statements about the Crime and Criminal Tracking Network System (CCTNS) is/are correct?
1. It will facilitate real time access of classified criminal data to the law enforcement authorities.
2. National Crime Record Bureau is the nodal agency mandated to implement the network in all the states.
Select the correct answer using the code given below-
 11 only
 22 only
 3Both 1 and 2
 4Neither 1 nor 2
  Ans: 1
Q.One byte consists of
 1four bits
 2one bit
 3ten bit
 4eight bits
  Ans: 4


 
Q.Storage media such as a CD read and write information using --
 1Magnetic strips
 2Magnetic dots
 3A laser beam of red light
 4All of these
  Ans: 4
Q.To reload a Web page, press the.... button.
 1Redo
 2Reload
 3Ctrl
 4Refresh
  Ans: 4
Q.The.... controls a client computer's resources.
 1Application program
 2Instruction set
 3Operating System
 4Server application
  Ans: 4
Q.The process of transferring files from a computer on the Internet to your computer is called--
 1Downloading
 2Uploading
 3FTP
 4JPEG
  Ans: 1
Q.Which media have the ability to have data/information stored (written) on them by users more than once?
 1CD-R disks
 2CD-RW disks
 3Zip disks
 4Optical Disks
  Ans: 2
Q.What are the four things needed to connect to the Internet?
 1Telephone line, modem, computer, and an ISP
 2Modem, computer, PDA and ISP
 3Telephone line, PDA, modem and computer
 4monitor, keyboard, mouse, modem
  Ans: 1
Q.What is e-commerce?
 1Buying and selling products and services over the Internet
 2Buying and selling international goods
 3Buying and selling products and services not found in stores
 4Buying and selling products having to do with computers
  Ans: 1
Q.Storage and memory differ with respect to which of the following characteristics?
 1Reliability
 2Speed
 3Price
 4All of these
  Ans: 4
Q.The ---- is the term used to describe the window that is currently being used.
 1Web Window
 2Display Area
 3Active Window
 4Monitor
  Ans: 3
Q.Which of the following devices is specially designed to forward packets to specific ports based on the packet's address?
 1Specialty hub
 2Switching hub
 3Port hub
 4Filtering hub
  Ans: 2
Q.After booting process which file executes automatically
 1config.sys
 2command.com
 3autoexec.bat
 4io.sys
  Ans: 3
Q.A System in which a transaction access and updates a file quickly enough to affect the original decision making is called
 1Real time system
 2time sharing system
 3both of above
 4None of above
  Ans: 1
Q.In time sharing system, the user carried a conversation with the central system called
 1interacting computer
 2conversation computing
 3Both of above
 4None of above
  Ans: 3
Q.The principle of time sharing is
 1large numbers of users direct access to the computer for problem solving
 2large number of user for file sharing
 3both of above
 4none
  Ans: 1
Q.Allocation of a resources in a time dependent fashion to several program simultaneously called
 1multi tasking
 2multi user
 3time sharing
 4None
  Ans: 3
Q.Batch processing is also known as
 1serial
 2sequential
 3off line processing
 4all of above
  Ans: 4
Q.Operating System for Microcomputer system is-
 1Unix
 2Linux
 3Windows
 4all
  Ans: 1
Q.Data are accumulated and processed in group called
 1Batch Processing
 2Group processing
 3Time sharing
 4None
  Ans: 1


 
Q.Macintosh computer use_____ Multitasking
 1Preemtive
 2cooperative
 3multiprogramming
 4none
  Ans: 2
Q.Preemptive and cooperative both are type of
 1Multiprogramming
 2Multitasking
 3Multi-user
 4None
  Ans: 2
Q.Multiprocessing supports more then one_____ at the same time
 1Process
 2User
 3Hardware
 4None
  Ans: 1
Q.Which one allow two or more users to run programs at the same time
 1Multiuser
 2Multitasking
 3Multiprocessing
 4None
  Ans: 1
Q.DMA stands for ________
 1Direct Memory Access
 2Distinct Memory Access
 3Direct Module Access
 4Direct Memory Allocation
  Ans: 1
Q.Which of the following is a read only memory storage device.
 1Floppy Disk
 2Hard Disk
 3CDROM
 4None of these
  Ans: 3
Q._________ is a semi conductor memory.
 1Dynamic
 2Static
 3Bubble
 4Both a & b
  Ans: 4
Q.Separate Read/Write heads are required in which of these memory access schemes.
 1Random Access
 2Sequential Access
 3Direct Access
 4None of these
  Ans: 4
Q.Which of the following are the best units of data on an external storage device?
 1Bits
 2Bytes
 3Hertz
 4Clock cycles
  Ans: 2
Q.In a Computer_________ is capable to store single binary bit.
 1Capacitor
 2Flip Flop
 3Register
 4Inductor
  Ans: 2
 




No comments: