Computer Science MCQs with Answer by General knowledge Solutions
Computer Science MCQs with Answer by General knowledge Solutions
1. A passive threat to computer security is—
- (a) Malicious Intent
- (b) Sabotage
- (c) Accident Errors
- (d) Espionage Agents
- (e) None of these
2. The Secure Electronic Transaction (SET) specification—
- (a) is a notice, issued and verified by a certificate authority, that guarantees a user or Web site is legitimate
- (b) provides private-key encryption of all data that passes between a client and a server
- (c) allows users to choose an encryption scheme for the data that passes between a client and a server
- (d) uses a public-key encryption to secure credit-card transaction systems
- (e) None of these
3. ……………allows wireless mobile devices to access the Internet and its services such as the Web and e-mail—
- (a) TCP/IP
- (b) Ethernet
- (c)WAP
- (d) Token ring
- (e) None of these
4. 'DOS' floppy disk does not have—
- (a) A Boot Record
- (b) A File Allocation Table
- (c) A Root Directory
- (d) Virtual Memory
- (e) BIOS
5. 'MICR' technology used for
clearance of cheques by banks refers to—
- (a) Magnetic Ink Character Recognition
- (b) Magnetic Intelligence Character Recognition
- (c) Magnetic Information Cable Recognition
- (d) Magnetic Insurance Cases Recognition
- (e) None of these
6. All the information collected
during database development is stored in a—
- (a) repository
- (b) data warehouse
- (3) RAD
- (4) CASE
- (5) None of these
7. The……………….component is used by the data analyst to create the
queries that access the database.
- (a) data extraction
- (b) end-user query tool
- (c) end-user presentation tool
- (d) data store
- (e) None of these
8. A(n)…………….allows network users to share a single copy of software,
which resides on the network server.
- (a) single-user license agreement
- (b) network site license
- (c) end-user license agreement
- (d) business software license
- (e) None of these
9. A polymorphic virus—
- (a) modifies its program code each time it attaches itself to another program or file
- (b) is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains
- (c) a malicious-logic program that hides within or looks like a legitimate program
- (d) infects a program file, but still reports the size and creation date of the original, uninfected program
- (e) None of these
10.
Microwave transmission is used in environments where installing physical
transmission media is—
- (a) difficult or impossible and where lineof-sight transmission is unavailable
- (b) easy or promising and where line-ofsight transmission is unavailable
- (c) difficult or impossible and where lineof-sight transmission is available
- (d) easy or promising and where line-ofsight transmission is available
- (e) None of these
No comments