Saturday 28 September 2013

Computer Awareness-42

1.     A (n)…………….allows network users to share a single copy of software, which resides on the network server.
a.      single-user license agreement
b.     network site license
c.      end-user license agreement
d.     business software license
2.     A polymorphic virus:
a.      modifies its program code each time it attaches itself to another program or file
b.     is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains
c.      a malicious-logic program that hides within or looks like a legitimate program
d.     infects a program file, but still reports the size and creation date of the original, uninfected program

3.     Microwave transmission is used in environments where installing physical transmission media is:
a.      difficult or impossible and where line-of-sight transmission is unavailable
b.     easy or promising and where line-of-sight transmission is unavailable
c.      difficult or impossible and where line-of-sight transmission is available
d.     easy or promising and where line-of-sight transmission is available
4.     Which is NOT a good Web security strategy?
a.      Restrict access to the Web server; keep a minimum number of ports open
b.     Limit the users who can load software, edit or add files.
c.      Add demo programs, so users can test system without accessing production data.
d.     Remove unnecessary compilers and interpreters.
5.     The altering of data so that it is not usable unless the changes are undone is:
a.      Biometrics
b.     Compression
c.      Encryption
d.     Ergonomics
6.     The word FTP stands for:
a.      File Translate Protocol
b.     File Transit Protocol
c.      File Typing Protocol
d.     File Transfer Protocol
7.     Voice mail:
a.      is the exchange of text messages and computer files transmitted via a communications network such as a local area network or the Internet
b.     permits users to converse in real time with each other via the computer while connected to the Internet
c.      functions much like an answering machine, allowing callers to leave a voice message for the called party
d.     involves using video and computer technology to conduct a meeting between participants at geographically separate locations
8.     A communication processor that connects dissimilar networks by providing the translation from one set of protocol to another is:
a.      Bridge
b.     Gateway
c.      Router
d.     Modem
9.     Which of the following is a general-purpose programming language, designed by Sun Microsystems, and well suited for use on the Web?
a.      VB Script
b.     Java Script
c.      CSS
d.     Java
10. This.............tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data.
a.      Client
b.     Applications/Web server
c.      Enterprise server
d.     DBA
11. RSA is:
a.      Symmetric Cryptosystem
b.     Asymmetric Cryptosystem
c.      Block Cypher
d.     Digital Signature
12. A DVD-RAM is similar to a………………except it has storage capacities up to 5.2 GB.
a.      CD-R
b.     floppy disk
c.      CD-RW
d.     hard disk
13. When you are selecting a mouse for a particular computer system, what is the most important consideration?
a.      The type of drivers that come with the mouse
b.     The length of the mouse cord
c.      The type of connector the mouse is equipped with
d.     The number of buttons the mouse has
14. How is power supplied to a low-power USB device?
a.      Through a power cable
b.     From an external power supply
c.      Directly from the computer's power supply
d.     Through the USB cable
15. All of the following are basic principles of net works, except:
a.      each computer must have a network card
b.     there must be communications media connecting the network hardware devices
c.      there must be at least one connecting device
d.     each computer must have software that supports the movement of information
16. The………….data mining technique derives rules from real-world case examples.
a.      Rule discover
b.     Signal processing
c.      Neural nets
d.     Case-based reasoning
17.  …………….are used to identify a user who returns to a Website.
a.      Cookies
b.     Plug-ins
c.      Scripts
d.     ASPs
18. Which one of the following objects is passed to a Java Bean when one of its properties is set via a JSP action?
a.      Servlet Request
b.     Http Servlet Request
c.      Servlet Response
d.     Http Servlet Response
19.  _ _ _ _ _ _ _ _ _ translates and executes program at run time line by line
a.       Compiler
b.     Interpreter
c.      Linker
d.     Loader
20.  _ _ _ _ _ _ _ _ is an OOP principle
a.      Structured programming
b.     Procedural programming
c.      Inheritance

d.     Linking

No comments: