Breaking News

Computer science MCQs with Answer (part 2) by General knowledge Solutions

Computer science MCQs with Answer (part 2) by General knowledge Solutions


                                                                           

                                                                         




 1. A passive threat to computer security is—
(A) Malicious Intent  : Answer as (a)
(B) Sabotage
(C) Accident Errors
(D) Espionage Agents
(E) None of these

2. The Secure Electronic Transaction (SET) specification—
(A) is a notice, issued and verified by a certificate authority, that guarantees a user or Web site is legitimate
(B) provides private-key encryption of all data that passes between a client and a server
(C) allows users to choose an encryption scheme for the data that passes between a client and a server
(D) uses a public-key encryption to secure credit-card transaction systems : Answer as (d)
(E) None of these

3. ……………allows wireless mobile devices to access the Internet and its services such as the Web and e-mail—
(A) TCP/IP
(B) Ethernet
(C)WAP   Answer as (c)
(D) Token ring
(E) None of these

 4. 'DOS' floppy disk does not have—
(A) A Boot Record
(B) A File Allocation Table
(C) A Root Directory
(D) Virtual Memory  Answer as (d)
(E) BIOS



 5. 'MICR' technology used for clearance of cheques by banks refers to—
(A) Magnetic Ink Character Recognition  Answer as (a)
(B) Magnetic Intelligence Character Recognition
(C) Magnetic Information Cable Recognition
(D) Magnetic Insurance Cases Recognition
(E) None of these

6. All the information collected during database development is stored in a—
(A) repository
(B) data warehouse  Answer as (b)
(C) RAD
(D) CASE
(E) None of these

 7. The……………….component is used by the data analyst to create the queries that access the database.
(A) data extraction
(B) end-user query tool  Answer as (b)
(C) end-user presentation tool
(D) data store
(E) None of these


8. A (n)…………….allows network users to share a single copy of software, which resides on the network server.
(A) single-user license agreement
(B) network site license  Answer as (B)
(C) end-user license agreement
(D) business software license
(E) None of these

9. A polymorphic virus—
 (A) modifies its program code each time it attaches itself to another program or file  :Answer as (A)
(B) is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains
(C) a malicious-logic program that hides within or looks like a legitimate program
(D) infects a program file, but still reports the size and creation date of the original, uninfected program
(E) None of these

10. Microwave transmission is used in environments where installing physical transmission media is—
(A) difficult or impossible and where lineof-sight transmission is unavailable
(B) easy or promising and where line-ofsight transmission is unavailable
(C) difficult or impossible and where lineof-sight transmission is available
(D) easy or promising and where line-ofsight transmission is available:  Answer as (d)
(E) None of these

 11. Which is NOT a good Web security strategy?
(A) Restrict access to the Web server; keep a minimum number of ports open
(B) Limit the users who can load software, edit or add files.
(C) Add demo programs, so users can test system without accessing production data.
(D) Remove unnecessary compilers and interpreters.  Answer as (d)
(E) None of these

12. The altering of data so that it is not usable unless the changes are undone is—
(A) Biometrics
(B) Compression
(C) Encryption  Answer as (C)
(D) Ergonomics
(E) None of these

 13. The word FIP stands for—
(A) File Translate Protocol  Answer as (a)
(B) File Transit Protocol
(C) File Typing Protocol
(D) File Transfer Protocol
(E) None of these

14. Voice mail—
(A) is the exchange of text messages and computer files transmitted via a communications network such as a local area network or the Internet
(B) permits users to converse in real time with each other via the computer while connected to the Internet
(C) functions much like an answering machine, allowing callers to leave a voice message for the called party  Answer as (C)
(D) involves using video and computer technology to conduct a meeting between participants at geographically separate locations
(E) None of these

15. A communication processor that connects dissimilar networks by providing the translation from one set of protocol to another is—
(1) Bridge
(B) Gateway :Answer as (B)
(C) Router
(D) Modem
(E) All of these

16. Which of the following is a generalpurpose programming language, designedby Sun Microsystems, and well suited for use on the Web?
(A) VB Script
(B) Java Script  Answer as (B)
(C) CSS
(D) Java
(E) None of these

17. This.............tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data.
(A) Client  Answer as (A)
(B) Applications/Web server
(C) Enterprise server
(D) DBA
(E) None of these


18. A ……… is a set of rules.

(A) resource locator
(B) domain
(C) hypertext
(D) URL
(E) protocol Answer  as  : (E)

 19. The connection between your computer at home and your local ISP is called—
(A) the last mile
(B) the home stretch
(C) the home page  Answer as  : (C)
(D) the backbone
(E) the vital mile

20. All of the logic and mathematical calculations done by the computer happen in/on the—
(A) system board
(B) central control unit
(C) central processing unit   Answer as : (C)
(D) mother board
(E) memory

21. There are several primary categories of procedures. Which of the following is not a primary category of procedures ?
(A) Testing
(B) Backup and recovery
(C) Firewall development   Answer as  : (C)
(D) Design 
(E) None of these


 22. The operating system called UNIX is typically used for—
(A) desktop computers
(B) laptop computers
(C) supercomputers
(D) Web servers
(E) All of these Answer as : (E)

 23. The………file format is a method of encoding pictures on a computer.
(A) HTML
(B) JPEG  Answer as  : (B)
(C) FTP
(D) URL
(E) DOC



24. Press………to move the insertion point to the Address box, or to highlight the URL in the Address box.
(A) ALT + D   Answer as  : (A)
(B) ALT + A
(C) SHIFT + TAB
(D) TAB + CTRL
(E) CTRL + S  



25. Computer systems are comprised of—
(A) hardware, programs, information, people and networks  Answer as  (A)
(B) hardware, software, procedures, networks and people
(C) hardware, programs, information, people and procedures
(D) hardware, programs, processors, procedures, networks and people
(E) hardware, programs, processors, procedures and people


  

No comments