Sunday, 13 December 2020

General Computer Test - 144


Q.1 A computer communication technology that provides a way to interconnect multiple computer across short distance is

(A) LAN

(B) MAN

(C) WAN

 (D) Wireless network

Ans: A LAN

Q.2 Telnet is a service that runs

(A) Television on net

 (B) Remote program

(C) Cable TV network

(D) Telenext

Ans: B Remote program

Q.3. A device that forwards data packet from one network to another is called a

(A) Bridge

(B) Switch

(C) Hub

(D) Gateway

Ans: B Switch

Q.4 Which of the following is the fastest media of data transfer

(A) Co-axial Cable

(B) Untwisted Wire

(C) Telephone Lines

(D) Fibre Optic

Ans: D Fiber Optic.

Q.5 Tool that is used to transfer data/files among computers on the Internet

(A) FTP

 (B) Archie

(C) TCP

(D) Gopher

Ans: C TCP

Q.6 HTML is a

(A) Programming Language

 (B) Scripting Language

(C) Web Browser

 (D) Network Protocol

Ans: B Scripting Language

Q.7 Secret-key encryption is also known as

(A) Asymmetric encryption

(B) Symmetric encryption

(C) Secret-encryption

(D) Private encryption

Ans: D Private encryption

Q.8 The concept of electronic cash is to execute payment by

(A) Credit Card

(B) ATM Card

(C) Using computers over network

(D) Cheque

Ans: C Using computers over network.

Q.9 SMTP is a

(A) Networking Protocol

(B) Protocol used for transferring message between end user & Mail Server

(C) Protocol used for smart card message interchange

(D) Encryption Standard

Ans: B Protocol used for transferring message between end user & Mail Server.

Q.10 Digital Signature is

(A)Scanned Signature on Computer

(B) Code number of the sender.

(C)Public Key Encryption.

(D)Software to recognize signature.

Ans: D Software to recognize signature

Q.11 Telnet is a

(A) Network of Telephones

(B) Television Network

(C) Remote Login

(D) Remote Login.

Ans: C Remote Login.

Q.12 The internet is

(A) Network of networks

(B) Web site.

(C) Host

(D) Server

Ans: A Network of networks

Q.13 An e-business that allows consumer to name their own price for products and services is following which e-business model?

(A) B2B

(B) B2G

(C) C2C

(D) C2B

Ans: D C2B

Q.14 Kerberos is an encryption-based system that uses

(A) Secret key encryption

 (B) Public key encryption

(C) Private key encryption

 (D) Data key encryption

Ans: A Secret key encryption.

Q.15 The method(s) of payment for online consumers are

(A) Electronic cash

(B) Credit/debit

(C) Electronic checks

(D) All of the above

Ans: D All of the Above.

Q.16 DNS is

(A) The distributed hierarchical naming system

(B) The vertical naming system

(C) The horizontal naming system

(D) The client server system

Ans: C The horizontal naming system.

Q.17 A firewall is

(A) An established network performance reference point.

(B) Software or hardware used to isolate a private network from a public network.

(C) A virus that infects macros.

(D) A predefined encryption key used to encrypt and decrypt data transmissions.

Ans: B Software or hardware used to isolate a private network from a public network.

Q.18 A router

(A) Screens incoming information.

(B) Distributes information between networks

(C) Clears all viruses from a computer system

(D) Is a work virus.

Ans: B Distributes information between networks

Q.19 LDAP stands for

(A) Light weight Data Access Protocol.

(B) Light weight Directory Access Protocol.

(C) Large Data Access Protocol.

(D) Large Directory Access Protocol.

Ans: B -> Light weight Directory Access Protocol.

Q.20 E-Commerce is not suitable for

(A) Sale/Purchase of expensive jewellery and antiques.

(B) Sale/Purchase of mobile phones.

(C) Sale/Purchase of branded clothes.

(D) Online job searching.

Ans: D Online job searching

Q.21 Amazon.com comes under the following model

(A) B2B

 (B) B2C

(C) C2C

 (D) C2B

Ans: B B2C

Q.22 Hubs are present in the network

(A) to diagnose line failures, measure and manage traffic flow and simplify re configuring of LANs.

(B) to interconnect the LAN with WANs.

(C) to interconnect the WANs with WANs.

(D) to interconnect the WANs with LANs.

Ans: B to interconnect the LAN with WANs.

Q.23 Firewalls operate by

(A)The pre-purchase phase.

(B) isolating Intranet from Extranet.

(C)Screening packets to/from the Network and provide controllable filtering of network traffic.

(D)None of the above.

Ans: C Screening packets to/from the Network and provide controllable filtering of network traffic.

Q.24 The mercantile process model consists of the following pahase(s):

(A) The pre-purchase phase.

(B) Purchase consummation phase.

(C) Post-purchase Interaction phase.

(D) All of the above.

Ans: D All of the Above.

25. To access a mainframe or supercomputer, users often use a __________.

A) terminal

B) node

C) desktop

D) handheld

Answers: A  Terminal

No comments:

Post a Comment