1. In the language of
the computer profession, one thousand position of main storage is represented
with the letter
(a) K
(b) L
(c) M
(d) C
(e) None of these
Ans : (a)
2. The control of the
jobs running within a system is
(a) Job monitoring
(b) Job stream
(c) Job min
(d) Job step
(e) None of these
Ans : (a)
3. The total number
of messages handled by a computerized telephone system on a daily basis is an
example of :
(a) Frequency
(b) Updating
(c) Volume
(d) All of these
(e) None of these
Ans : (d)
4. A device mounted
on a communication satellite which receives, amplifies and re- transmits
signals from earth station is
(a) Track
(b) Transponder
(c) Transistor
(d) Terminal
(e) None of these
Ans : (b)
5. What is the
acronym for Single In-Line Memory Module?
(a) SIMM
(b) SILMM
(c) SM
(d) SMM
(e) None of these
Ans : (a)
6. Which type of
processing that produces output results immediately after input data are
entered into a computer system
(a) Time-sharing
(b) Interactive
(c) Batch Processing
(d) Real-time processing
(e) None of these
Ans : (b)
7. A computer program
that instructs other programs to perform a particular type of operation is
(a) System software
(b) Application program
(c) Compiler
(d) Interpreter
(e) None of these
Ans : (a)
8. The provides a
path between the CPU and peripheral devices, which are connected via interface
cards
(a) computer
(b) expansion bus
(c) memory
(d) CPU
(e) None of these
Ans : (b)
9. Programs prepared
by an outside supplier & provided to a user in a machine readable form is
known as
(a) Utility program
(b) Canned program
(c) Application program
(d) Application software
(e) None of these
Ans : (b)
10. Pictures or
drawings, typically displayed on a VDU to allow users to select program options
is called
(a) HIPO charts
(b) Icons
(c) Graphics
(d) Network
(e) None of these
Ans : (b)
11. The pieces of
equipment which are attached to the CPU of a computer and which it can access
are called
(a) output devices
(b) control units
(c) hardware
(d) disk drive
(e) peripherals
Ans : (e)
12. A factor which
might cause an individual to consider using a computer in criminal activities
is :
(a) The computer’s access to large sums of money
(b) The speed with which the crime can be accomplished
(c) EFTS (Electronic Funds Transfer System)
(d) All the these
(e) None of these
Ans : (d)
13. The Secure
Electronic Transaction (SET) specification
(a) is a notice, issued and verified by a certificate authority, that guarantees a user or Web site is legi timate
(b) provides private-key encryption of all data that passes between a client and a server
(c) allows users to choose an encryption scheme for the data that passes between a client and a server
(d) uses a public-key encryption to secure credit-card transaction systems
(e) None of these
Ans : (d)
14. ‘DOS’ floppy disk
does not have
(a) A Boot Record
(b) A File Allocation Table
(c) A Root Directory
(d) Virtual Memory
(e) BIOS
Ans : (e)
15. All the
information collected during database
development is stored in a_
(a) repository
(b) data warehouse
(c) RAD
(d) CASE
(e) None of these
Ans : (b)
16. The component is
used by the data analyst to create the queries that access the database.
(a) data extraction
(b) end-user query tool
(c) end-user presentation tool
(d) data store
(e) None of these
Ans : (b)
17. A polymorphic
virus
(a) modifies its program code each time it attaches itself to another program or file
(b) is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains.
(c) a malicious-logic program that hides within or looks like a legitimate program
(d) infects a program file, but still reports the size and creation date of the original uninfected program
(e) None of these
Ans : (a)
18. Microwave
transmission is used in environments where installing physical transmission
media is
(a) difficult or impossible and where line-of- sight transmission is unavailable
(b) easy or promising and where line-of-sight transmission is unavailable
(c) difficult or impossible and where line-of- sight transmission is available
(d) easy or promising and where line-of-sight transmission is available
(e) None of these
Ans : (d)
19. Which is NOT a
good Web security strategy?
(a) Restrict access to the Web server; keep a minimum number of ports open
(b) Limit the users who can load software, edit or add files.
(c) Add demo programs, so users can test system without accessing production data.
(d) Remove unnecessary compilers and interpreters
(e) None of these
Ans : (d)
20. The word FTP
stands for
(a) File Translate Protocol
(b) File Transit Protocol
(c) File Typing Protocol
(d) File Transfer Protocol
(e) None of these
Ans : (a)
21. This tier
processes HTTP protocol, scripting tasks, performs calculations, and provides
access to data.
(a) Client
(b) Applications/Web server
(c) Enterprise Server
(d) DBA
(e) None of these
Ans : (a)
22. RSA is
(a) Symmetric Cryptosystem
(b) Asymmetric Cryptosystem
(c) Block Cypher
(d) Digital Signature
(e) None of these
Ans : (d)
23. A DVD-RAM is
similar to a…………except it has storage capacities upto 5.2 GB.
(a) CD-R
(b) floppy disk
(c) CD-RW
(d) hard disk
(e) None of these
Ans : (c)
24. How is power
supplied to a low-power USB device?
(a) Through a power cable
(b) From an external power supply
(c) Directly from the computer’s power supply
(d) Through the USB cable
(e) None of these
Ans : (d)
25. The………data mining
techniques derives rules from real-world case examples.
(a) Rule discover
(b) Signal processing
(c) Neural nets
(d) Case-based reasoning
(e) None of these