1.
A (n)…………….allows
network users to share a single copy of software, which resides on the network
server.
a. single-user license agreement
b. network
site license
c. end-user license agreement
d. business software license
2.
A polymorphic virus:
a. modifies
its program code each time it attaches itself to another program or file
b. is a malicious-logic program that copies itself
repeatedly in memory or on a disk drive until no memory or disk space remains
c. a malicious-logic program that hides within or
looks like a legitimate program
d. infects a program file, but still reports the
size and creation date of the original, uninfected program
3.
Microwave transmission
is used in environments where installing physical transmission media is:
a. difficult or impossible and where line-of-sight
transmission is unavailable
b. easy or promising and where line-of-sight
transmission is unavailable
c. difficult or impossible and where line-of-sight
transmission is available
d. easy
or promising and where line-of-sight transmission is available
4.
Which is NOT a good Web
security strategy?
a. Restrict access to the Web server; keep a
minimum number of ports open
b. Limit the users who can load software, edit or
add files.
c. Add demo programs, so users can test system
without accessing production data.
d. Remove
unnecessary compilers and interpreters.
5.
The altering of data so
that it is not usable unless the changes are undone is:
a. Biometrics
b. Compression
c. Encryption
d. Ergonomics
6.
The word FTP stands for:
a. File Translate Protocol
b. File Transit Protocol
c. File Typing Protocol
d. File
Transfer Protocol
7.
Voice mail:
a. is the exchange of text messages and computer
files transmitted via a communications network such as a local area network or
the Internet
b. permits users to converse in real time with each
other via the computer while connected to the Internet
c. functions
much like an answering machine, allowing callers to leave a voice message for
the called party
d. involves using video and computer technology to
conduct a meeting between participants at geographically separate locations
8.
A communication
processor that connects dissimilar networks by providing the translation from
one set of protocol to another is:
a. Bridge
b. Gateway
c. Router
d. Modem
9.
Which of the following
is a general-purpose programming language, designed by Sun Microsystems, and
well suited for use on the Web?
a. VB Script
b. Java
Script
c. CSS
d. Java
10.
This.............tier
processes HTTP protocol, scripting tasks, performs calculations, and provides
access to data.
a. Client
b. Applications/Web server
c. Enterprise server
d. DBA
11.
RSA is:
a. Symmetric Cryptosystem
b. Asymmetric Cryptosystem
c. Block Cypher
d. Digital
Signature
12.
A DVD-RAM is similar to
a………………except it has storage capacities up to 5.2 GB.
a. CD-R
b. floppy disk
c. CD-RW
d. hard disk
13.
When you are selecting a
mouse for a particular computer system, what is the most important
consideration?
a. The type of drivers that come with the mouse
b. The length of the mouse cord
c. The
type of connector the mouse is equipped with
d. The number of buttons the mouse has
14.
How is power supplied to
a low-power USB device?
a. Through a power cable
b. From an external power supply
c. Directly from the computer's power supply
d. Through
the USB cable
15.
All of the following are
basic principles of net works, except:
a. each computer must have a network card
b. there
must be communications media connecting the network hardware devices
c. there must be at least one connecting device
d. each computer must have software that supports
the movement of information
16.
The………….data mining
technique derives rules from real-world case examples.
a. Rule discover
b. Signal processing
c. Neural
nets
d. Case-based reasoning
17.
…………….are used to identify a user who returns
to a Website.
a. Cookies
b. Plug-ins
c. Scripts
d. ASPs
18.
Which one of the
following objects is passed to a Java Bean when one of its properties is set
via a JSP action?
a. Servlet Request
b. Http Servlet Request
c. Servlet
Response
d. Http Servlet Response
19.
_ _ _ _ _ _ _ _ _ translates and executes
program at run time line by line
a. Compiler
b. Interpreter
c. Linker
d. Loader
20.
_ _ _ _ _ _ _ _ is an OOP principle
a. Structured
programming
b. Procedural programming
c. Inheritance
d. Linking
No comments:
Post a Comment