Q. 1 A common boundary between two systems is called ?
(A) Interdiction
(B) Interface
(C) Surface
(D) None of These
Q. 2 Mechanism to protect network from outside attack is.
(A) Firewall
(B) Anti - virus
(C) Digital Signature
(D) Formatting
Q. 3 Which of the following is/are web hosting servers.
(A) Apache HTTP servers
(B) Jigsaw servers
(C) Lighttpd
(D) All of Above
Q. 4 A device operating at the physical layer is called a.
(A) Bridge
(B) Router
(C) Repeater
(D) All of Above
Q. 5 A step by step procedure used to solve a problem is called.
(A) Operating System
(B) Algorithm
(C) Application Program
(D) All of Above
Q. 6 In a ring topology, the computer in possession of the ............... can transmit data.
(A) Packet
(B) Data
(C) Access method
(D) Token
Q. 7 Which of the following is used as storage locations both in the ALU and the control section of a computer ?
(A) Register
(B) Decoder
(C) Adder
(D) Accumulator
Q. 8 Which among the following has been standardized in the IEEE 802.3 specification ?
(A) Bluetooth
(B) Ethernet
(C) WiMAX
(D) All of Above
Q. 9 The list of coded instructions is called.
(A) Computer Program
(B) Algorithm
(C) Flowchart
(D) None of The Above
Q. 10 Like a virus, it is a self replicating program. It also propogates through computer network.
(A) Spyware
(B) Worm
(C) Cracker
(D) Phishing Scam
Ans. 1 (B), 2 (A), 3 (D), 4 (C), 5(B), 6 (D), 7 (A), 8 (B), 9 (A), 10 (D)
(A) Interdiction
(B) Interface
(C) Surface
(D) None of These
Q. 2 Mechanism to protect network from outside attack is.
(A) Firewall
(B) Anti - virus
(C) Digital Signature
(D) Formatting
Q. 3 Which of the following is/are web hosting servers.
(A) Apache HTTP servers
(B) Jigsaw servers
(C) Lighttpd
(D) All of Above
Q. 4 A device operating at the physical layer is called a.
(A) Bridge
(B) Router
(C) Repeater
(D) All of Above
Q. 5 A step by step procedure used to solve a problem is called.
(A) Operating System
(B) Algorithm
(C) Application Program
(D) All of Above
Q. 6 In a ring topology, the computer in possession of the ............... can transmit data.
(A) Packet
(B) Data
(C) Access method
(D) Token
Q. 7 Which of the following is used as storage locations both in the ALU and the control section of a computer ?
(A) Register
(B) Decoder
(C) Adder
(D) Accumulator
Q. 8 Which among the following has been standardized in the IEEE 802.3 specification ?
(A) Bluetooth
(B) Ethernet
(C) WiMAX
(D) All of Above
Q. 9 The list of coded instructions is called.
(A) Computer Program
(B) Algorithm
(C) Flowchart
(D) None of The Above
Q. 10 Like a virus, it is a self replicating program. It also propogates through computer network.
(A) Spyware
(B) Worm
(C) Cracker
(D) Phishing Scam
Ans. 1 (B), 2 (A), 3 (D), 4 (C), 5(B), 6 (D), 7 (A), 8 (B), 9 (A), 10 (D)
No comments:
Post a Comment