COMPUTER AWARENESS 28

Q. 1   A common boundary between two systems is called ?
(A)   Interdiction
(B)   Interface
(C)   Surface
(D)   None of These

Q. 2   Mechanism to protect network from outside attack is.
(A)   Firewall
(B)   Anti - virus
(C)   Digital Signature
(D)   Formatting

Q. 3   Which of the following is/are web hosting servers.
(A)   Apache HTTP servers
(B)   Jigsaw servers
(C)   Lighttpd
(D)   All of Above

Q. 4   A device operating at the physical layer is called a.
(A)   Bridge
(B)   Router
(C)   Repeater
(D)   All of Above

Q. 5   A step by step procedure used to solve a problem is called.
(A)   Operating System
(B)   Algorithm
(C)   Application Program
(D)   All of Above

Q. 6   In a ring topology, the computer in possession of the ............... can transmit data.
(A)   Packet
(B)   Data
(C)   Access method
(D)   Token

Q. 7   Which of the following is used as storage locations both in the ALU and the control section of a computer ?
(A)   Register
(B)   Decoder
(C)   Adder
(D)   Accumulator

Q. 8   Which among the following has been standardized in the IEEE 802.3 specification ?
(A)   Bluetooth
(B)   Ethernet
(C)   WiMAX
(D)   All of Above

Q. 9   The list of coded instructions is called.
(A)   Computer Program
(B)   Algorithm
(C)   Flowchart
(D)   None of The Above

Q. 10   Like a virus, it is a self replicating program. It also propogates through computer network.
(A)   Spyware
(B)   Worm
(C)   Cracker
(D)   Phishing Scam



Ans. 1 (B), 2 (A), 3 (D), 4 (C), 5(B), 6 (D), 7 (A), 8 (B), 9 (A), 10 (D)

No comments: