1. A Passive threat to computer security is-
(1) Malicious Intent
(2) Sabotage
(3) Accidental Errors
(4) Espionage Agents
(5) None of these
2.
____ allows wireless mobile devices to access
the Internet and its services such as the Web and e-mail.
(1) TCP/IP
(2) Ethernet
(3) WAP
(4) Token ring
(5) None of these
3.
‘DOS’ floppy disk does not have____.
(1) A Boot Record
(2) A File Allocation Table
(3) A Root Directory
(4) Virtual Memory
(5) BIOS
4.
‘MICR’ technology used for clearance of cheques
by banks refers to ____.
(1) Magnetic Ink Character
Recognition
(2) Magnetic Intelligence Character
Recognition
(3) Magnetic Information Cable
Recognition
(4) Magnetic Insurance Cases
Recognition
(5) None of these
5.
All the information collected during database
development is stored in a ____.
(1) repository
(2) data warehouse
(3) RAD
(4) CASE
(5) None of these
6.
The ____ component is used by the data analyst
to create the queries that access the database.
(1) data extraction
(2) end-user query tool
(3) end-user presentation tool
(4) data store
(5) None of these
7.
The altering of data so that it is not usable
unless the changes are undone is ____.
(1) Biometrics
(2) Compression
(3) Encryption
(4) Ergonomics
(5) None of these
8.
The word FTP stands for-
(1) File Transfer Protocol
(2) File Transit Protocol
(3) File Typing Protocol
(4) File Transfer Protocol
(5) None of these
9.
This ____ tier processes HTTP protocol,
scripting tasks, performs calculations, and provides access to data.
(1) Client
(2) Applications/Web server
(3) Enterprise server
(4) DBA
(5) None of these
10.
A DVD-RAM is similar to a ____, except it has
storage capacities up to 5.2 GB.
(1) CD-R
(2) Floppy disk
(3) CD-RW
(4) Hard disk
(5) None of these
11.
All of the following are basic principles of
networks, except-
(1) each computer must have a network
card
(2) there must be communications
media connecting the network hardware devices
(3) there must be at least one
connecting device
(4) each computer must have software
that supports the movement of information
(5) None of these
12.
____ are used to identify a user who returns to
a Website.
(1) Cookies
(2) Plug-ins
(3) Scripts
(4) ASPs
(5) None of these
13.
If you wanted to locate the hardware address of
a local device, which protocol would you use?
(1) ARP
(2) RARP
(3) ICMP
(4) PING
(5) PONG
14.
The term, ‘hypertext’ means-
(1) Non-sequential writing
(2) Hypermedia
(3) Blinking text
(4) Text with heavy formatting
(5) None of these
15.
Which kind of lock includes a keypad that can be
used to control access into areas?
(1) Cipher
(2) Warded
(3) Device
(4) Tumbler
(5) Type lock
16.
What is the name of protocol used in eliminate
loops?
(1) Switching
(2) ISL
(3) Frame tagging
(4) Spanning Tree Protocol
(5) None of these
17.
In networking terminology UTP means –
(1) Unshielded Twisted Pair
(2) Ubiquitous Teflon Port
(3) Uniformly Terminating Port
(4) Unshielded T-Connector
(5) None of these
18.
In OSI network architecture, the dialogue
control and token management are responsibility of-
(1) Session layer
(2) Network layer
(3) Transport layer
(4) Data link layer
(5) None of the above
19.
A ‘C’ data structure called a structure is a
group of items in which each item is identified by its own identifier, each of
which is known as a member of a structure. Member is also known as-
(1) Information
(2) Field
(3) Record
(4) Data type
(5) None of these
20.
Multithread means-
(1) Program do more than one thing at
a time
(2) More than one program do one
thing at a time
(3) Both are correct
(4) Both are incorrect
(5) None of these
21.
A page fault occurs?
(1) when the page is not in the
memory
(2) when the page is in the memory
(3) when the process enters the
blocked state
(4) when the process is in the ready
state
(5) None of these
22.
“Each packet contains the full source and
destination address.” This statement indicates which of the following?
(1) Virtual Circuit
(2) Datagram
(3) Data link
(4) FDDI
(5) None of these
23.
Data bus is-
(1) Unidirectional
(2) Bidirectional
(3) Both (1) & (2)
(4) Multidirectional
(5) None of these
24.
Which of the following is a type of ISDN
(Integrated Service Digital Network)?
(1) Narrow bank
(2) Broad band
(3) Both (1) & (2)
(4) Virtual Circuit
(5) None of these
25.
Which of the following is a browser to view a
web page?
(1) Mosaic
(2) Netscape
(3) Internet Explorer
(4) All of the above
(5) None of these
26.
A graph is a collection of-
(1) Row and columns
(2) Vertices and edges
(3) Equations
(4) Identity
(5) None of these
27.
CDMA is used in-
(1) Wireless and local loop
(2) Allocating a wireless channel
(3) Both (1) & (2)
(4) Local loop
(5) None of these
28.
Number of arcs incident to a node is called its-
(1) Level
(2) Predecessor
(3) Degree
(4) Successor
(5) None of these
29.
OSPF means-
(1) Open shortest path finite
protocol
(2) Open shortest path finite
protocol
(3) Open slotted path finite protocol
(4) Open slotted path first protocol
(5) None of these
30.
Binding the same name to multiple operations
whose signatures differ in number or types of arguments?
(1) Overloading
(2) Origin class
(3) Object model
(4) Package
(5) None of these
31.
What is the name of the chip which has more than
one processor on it?
(1) Parallel chip
(2) Multi-processor chip
(3) Transputer
(4) Parallel processor
(5) None of these
32.
In windows-
(1) Docking views may be docked
(2) Docking views may be float
(3) Docking views may be docked or
float
(4) All of the above
(5) None of these
33.
____ performs relocations function?
(1) Absolute loader
(2) Direct linking loader
(3) Relocating loader
(4) Linkage editor
(5) None of these
34.
A central computer surrounded by one or more
satellite computers is called a-
(1) Bus network
(2) Ring network
(3) Star network
(4) All of the above
(5) None of these
35.
Segmentation –
(1) is a memory management scheme
that supports user view of memory
(2) logical address space is
collection of segments
(3) logical address consists of two
tuple < segment-number, offset>.
(4) All of the above
(5) None of these
36.
Which of the following is a major component of
the telephone system?
(1) Local loop
(2) Trunks
(3) Switching office
(4) All of these
(5) None of these
37.
Function is invoked by-
(1) Function
(2) Declaration
(3) Definition
(4) Prototype
(5) None of these
38.
The ACCEPT command in SQL?
(1) Creates a customized prompt when
accepting user input
(2) Explicitly defines a NUMBER or
DATE data type variable
(3) Hides user input for security
reasons
(4) All of the above
(5) None of these
39.
How many fields are required to represent a
header node of a graph?
(1) 3
(2)
2
(3) 4
(4)
5
(5) None of these
40.
Which of the following is not used as a data
structure?
(1) Array
(2) Linked list
(3) Graph
(4) Directory
(5) None of these
41.
Which of the following is an operating system
call?
(1) CREATE
(2) LINK
(3) SYSTEM
(4) All of these
(5) None of these
42.
In C++, by default, the members of a class are-
(1) Public
(2) Private
(3) Both public and private
(4) Only Public
(5) None of these
43.
In core banking systems:
(1) Store and forward of transaction
is done
(2) Branch server is not required
(3) Local database is not required
(4) Transaction cannot happen from a
non-home branch
(5) None of these
44.
MV command in Unix changes-
(1) Only the directory
(2) Only the directory entry and
i-node
(3) Only the i-node number
(4) All of the above
(5) None of these
45.
E-Commerce refers to-
(1) Electrical commerce
(2) Electronic commerce
(3) Evolutionary commerce
(4) Effective commerce
(5) None of these
46.
Graphs can be implemented using-
(i) Arrays (ii) Linked list (iii)
Stack (iv) Queue
(1) (i), (ii) and (iv)
(2) (i), (ii) and (iii)
(3) (ii) and (iii)
(4) (i) and (iv)
(5) None of these
47.
Thrashing-
(1) Always occur on large computers
(2) is a natural consequence of
virtual memory systems
(3) Can always be avoided by swapping
(4) Can be caused by poor paging
algorithm
(5) None of these
48.
The process of converting analog signals into
digital signals so they can be processed by a receiving computer is referred
as-
(1) modulation
(2) demodulation
(3) synchronizing
(4) digitizing
(5) None of these
49.
The relational database environment has all of
the following components except-
(1) Users
(2) Separate files
(3) Database
(4) Database administrator
(5) None of these
50.
Primary key-
(1) Denote a candidate key that is
chosen by the database designer as the principal means of identifying entities
with in an entity set
(2) Attributes names of all primary
key are unique
(3) Primary key specification is
optional and good idea to specify primary key for each relation
(4) All of the above
(5) None of these
1
|
1
|
11
|
4
|
21
|
1
|
31
|
3
|
41
|
4
|
2
|
3
|
12
|
1
|
22
|
2
|
32
|
2
|
42
|
2
|
3
|
5
|
13
|
1
|
23
|
2
|
33
|
3
|
43
|
1
|
4
|
1
|
14
|
2
|
24
|
3
|
34
|
3
|
44
|
1
|
5
|
1
|
15
|
1
|
25
|
4
|
35
|
4
|
45
|
2
|
6
|
2
|
16
|
4
|
26
|
2
|
36
|
4
|
46
|
4
|
7
|
3
|
17
|
3
|
27
|
3
|
37
|
1
|
47
|
4
|
8
|
4
|
18
|
1
|
28
|
3
|
38
|
4
|
48
|
4
|
9
|
2
|
19
|
2
|
29
|
1
|
39
|
1
|
49
|
2
|
10
|
3
|
20
|
1
|
30
|
1
|
40
|
4
|
50
|
4
|