Computer science MCQs with Answer (part 2) by General knowledge Solutions
Computer science MCQs with Answer (part 2) by General knowledge Solutions
1. A
passive threat to computer security is—
(A)
Malicious Intent : Answer as (a)
(B) Sabotage
(C) Accident Errors
(D) Espionage Agents
(E) None of these
2. The Secure Electronic Transaction (SET)
specification—
(A) is a notice, issued and verified by a
certificate authority, that guarantees a user or Web site is legitimate
(B) provides private-key encryption of all
data that passes between a client and a server
(C) allows users to choose an encryption
scheme for the data that passes between a client and a server
(D)
uses a public-key encryption to secure credit-card transaction systems : Answer
as (d)
(E) None of these
3. ……………allows wireless mobile devices to
access the Internet and its services such as the Web and e-mail—
(A) TCP/IP
(B) Ethernet
(C)WAP
Answer as (c)
(D) Token ring
(E) None of these
4.
'DOS' floppy disk does not have—
(A) A Boot Record
(B) A File Allocation Table
(C) A Root Directory
(D)
Virtual Memory Answer as (d)
(E) BIOS
5.
'MICR' technology used for clearance of cheques by banks refers to—
(A)
Magnetic Ink Character Recognition Answer as (a)
(B) Magnetic Intelligence Character
Recognition
(C) Magnetic Information Cable Recognition
(D) Magnetic Insurance Cases Recognition
(E) None of these
6. All the information collected during
database development is stored in a—
(A) repository
(B)
data warehouse Answer as (b)
(C) RAD
(D) CASE
(E) None of these
7.
The……………….component is used by the data analyst to create the queries that
access the database.
(A) data extraction
(B)
end-user query tool Answer as (b)
(C) end-user presentation tool
(D) data store
(E) None of these
8. A (n)…………….allows network users to share
a single copy of software, which resides on the network server.
(A)
single-user license agreement
(B)
network site license Answer as (B)
(C) end-user license agreement
(D) business software license
(E) None of these
9. A polymorphic virus—
(A) modifies its program code each time it
attaches itself to another program or file :Answer as (A)
(B) is a malicious-logic program that
copies itself repeatedly in memory or on a disk drive until no memory or disk
space remains
(C) a malicious-logic program that hides
within or looks like a legitimate program
(D) infects a program file, but still
reports the size and creation date of the original, uninfected program
(E) None of these
10. Microwave transmission is used in
environments where installing physical transmission media is—
(A) difficult or impossible and where
lineof-sight transmission is unavailable
(B) easy or promising and where
line-ofsight transmission is unavailable
(C) difficult or impossible and where
lineof-sight transmission is available
(D)
easy or promising and where line-ofsight transmission is available: Answer as (d)
(E) None of these
11.
Which is NOT a good Web security strategy?
(A)
Restrict access to the Web server; keep a minimum number of ports open
(B) Limit the users who can load software,
edit or add files.
(C) Add demo programs, so users can test
system without accessing production data.
(D)
Remove unnecessary compilers and interpreters. Answer as (d)
(E) None of these
12. The altering of data so that it is not
usable unless the changes are undone is—
(A) Biometrics
(B) Compression
(C)
Encryption Answer as (C)
(D) Ergonomics
(E)
None of these
13.
The word FIP stands for—
(A)
File Translate Protocol Answer as (a)
(B) File Transit Protocol
(C) File Typing Protocol
(D) File Transfer Protocol
(E) None of these
14. Voice mail—
(A) is the exchange of text messages and
computer files transmitted via a communications network such as a local area
network or the Internet
(B) permits users to converse in real time
with each other via the computer while connected to the Internet
(C)
functions much like an answering machine, allowing callers to leave a voice
message for the called party Answer as
(C)
(D) involves using video and computer
technology to conduct a meeting between participants at geographically separate
locations
(E) None of these
15. A communication processor that connects
dissimilar networks by providing the translation from one set of protocol to
another is—
(1) Bridge
(B)
Gateway :Answer as (B)
(C)
Router
(D) Modem
(E)
All of these
16. Which of the following is a
generalpurpose programming language, designedby Sun Microsystems, and well
suited for use on the Web?
(A) VB Script
(B)
Java Script Answer as (B)
(C) CSS
(D) Java
(E) None of these
17. This.............tier processes HTTP
protocol, scripting tasks, performs calculations, and provides access to data.
(A)
Client Answer as (A)
(B) Applications/Web server
(C) Enterprise server
(D) DBA
(E) None of these
18. A ……… is a set of rules.
(A) resource locator
(B) domain
(C) hypertext
(D) URL
(E) protocol Answer as : (E)
19. The connection between your computer at home and your local ISP is called—
(A) the last mile
(B) the home stretch
(C) the home page Answer as : (C)
(D) the backbone
(E) the vital mile
20. All of the logic and mathematical calculations done by the computer happen in/on the—
(A) system board
(B) central control unit
(C) central processing unit Answer as : (C)
(D) mother board
(E) memory
21. There are several primary categories of procedures. Which of the following is not a primary category of procedures ?
(A) Testing
(B) Backup and recovery
(C) Firewall development Answer as : (C)
(D) Design
(E) None of these
22. The operating system called UNIX is typically used for—
(A) desktop computers
(B) laptop computers
(C) supercomputers
(D) Web servers
(E) All of these Answer as : (E)
23. The………file format is a method of encoding pictures on a computer.
(A) HTML
(B) JPEG Answer as : (B)
(C) FTP
(D) URL
(E) DOC
24. Press………to move the insertion point to the Address box, or to highlight the URL in the Address box.
(A) ALT + D Answer as : (A)
(B) ALT + A
(C) SHIFT + TAB
(D) TAB + CTRL
(E) CTRL + S
25. Computer systems are comprised of—
(A) hardware, programs, information, people and networks Answer as (A)
(B) hardware, software, procedures, networks and people
(C) hardware, programs, information, people and procedures
(D) hardware, programs, processors, procedures, networks and people
(E) hardware, programs, processors, procedures and people
No comments