Breaking News

Computer Science MCQs with Answer by General knowledge Solutions



Computer Science MCQs with Answer   by General knowledge Solutions


                                 







           1.  A passive threat to computer security is—

  • (a) Malicious Intent
  • (b) Sabotage
  • (c) Accident Errors
  • (d) Espionage Agents
  • (e) None of these

2. The Secure Electronic Transaction (SET) specification—
  • (a) is a notice, issued and verified by a certificate authority, that guarantees a user or Web site is legitimate
  • (b) provides private-key encryption of all data that passes between a client and a server
  • (c) allows users to choose an encryption scheme for the data that passes between a client and a server
  • (d) uses a public-key encryption to secure credit-card transaction systems
  • (e) None of these


3. ……………allows wireless mobile devices to access the Internet and its services such as the Web and e-mail—


  • (a) TCP/IP
  • (b) Ethernet
  • (c)WAP
  • (d) Token ring
  • (e) None of these


 4. 'DOS' floppy disk does not have—
  • (a) A Boot Record
  • (b) A File Allocation Table
  • (c) A Root Directory
  • (d) Virtual Memory
  •  (e) BIOS


 5. 'MICR' technology used for clearance of cheques by banks refers to—
  • (a) Magnetic Ink Character Recognition
  • (b) Magnetic Intelligence Character Recognition
  • (c) Magnetic Information Cable Recognition
  • (d) Magnetic Insurance Cases Recognition
  • (e) None of these



 6. All the information collected during database development is stored in a—
  • (a) repository
  • (b) data warehouse
  • (3) RAD
  • (4) CASE
  • (5) None of these



7. The……………….component is used by the data analyst to create the queries that access the database.


  • (a) data extraction
  • (b) end-user query tool
  • (c) end-user presentation tool
  • (d) data store
  • (e) None of these


8. A(n)…………….allows network users to share a single copy of software, which resides on the network server.
  • (a) single-user license agreement
  • (b) network site license
  • (c) end-user license agreement
  • (d) business software license
  • (e) None of these



9. A polymorphic virus—
  • (a) modifies its program code each time it attaches itself to another program or file
  • (b) is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains
  •  (c) a malicious-logic program that hides within or looks like a legitimate program
  • (d) infects a program file, but still reports the size and creation date of the original, uninfected program
  •  (e) None of these



     10. Microwave transmission is used in environments where installing physical transmission         media is—
  •     (a) difficult or impossible and where lineof-sight transmission is unavailable
  •     (b) easy or promising and where line-ofsight transmission is unavailable
  •     (c) difficult or impossible and where lineof-sight transmission is available
  •     (d) easy or promising and where line-ofsight transmission is available
  •     (e) None of these


No comments