1. An operating system that is
capable of allowing multiple software processes to run at the same time:
a. Multitasking
b. Multiprocessing
c. Real Time
d. Multithreading
2. Personal logs or journal entries
posted on the internet are known as____________
b. Webcasts
c. blogs
d. Chache
3. Chip is a common nickname
for a(n) ____________
a. transistor
b. resistor
c. integrated circuit
d. semiconductor
4. The ability of a computer to
execute multiple programs by using multiple processors simultaneously is known
as_______________
a. Multitasking
b. Multiprocessing
c. Multiprogramming
d. Multithreading
5. An e-mail account includes a
storage area, often called a(n)
a. Attachment
b. Hyperlink
c. Mailbox
d. Dropbox
6. Which of the following is
the default extension of notepad file?
a. .html
b. .doc
c. .txt
d. .ntp
7. The Institution set up by
the Government of India to provide computer based information services to
government departments
a. C-DIT
b. DOEACC
c. CDAC
d. NIC
8. The base of octal number
is:
a. 2
b. 8
c. 10
d. 16
9. Information Communication
Technology (ICT) involves primarily
a. Enrichment of existing
knowledge
b. Installation of
equipments
c. Storage and communication of
information
d. Use of technology for
teaching
10. Disadvantage of
distributed database is.
a.
Unreliability
b.
Easy implementation
c.
Insecurity
d.
High communication cost
11. Which of the following
transmission techniques let computer to alternatively send and receive data?
a.
Simplex
b.
Half duplex
c.
Full duplex
d.
Multiplexing
12. What is NOT a feature of
networking?
a.
Reliability
b.
Greater storage space
c.
Connectivity
d.
All are features of networking
13. Taking back-up of a file
against crash is a
a.
Preventive measure
b.
Curative measure
c.
Decisive measure
d.
None of these
14. A memory that is
referred by its contents instead of physical address is called___________
a.
Associative memory
b.
Content addressable storage
c.
Both a and b.
d.
None of these
15. Most dangerous risk in
leaking of information is :
a.
ready access to online terminals
b.
Online processing of data
c.
Ignorance about the existence of risk
d.
All of these
16. A camera is an
a.
Input device
b.
Can be either input or output
c.
Processing machine
d.
Output device
17. Using anti-virus
software is
a.
Preventive measure
b.
Detective measure
c.
Corrective measure
d.
All the above
18. An online transaction is
a.
One that is done in real time
b.
Transaction done via internet
c.
One that is done via telephone
d.
None of these
19. A clerk in a bank has to
access data in customer account. Logical access control for these users would
be.
a.
Use of individual passwords
b.
Use of a Accounts Receivable Section password
c.
Use of individual passwords plus separate access passwords for
customer data and product data
d.
Can’t say
20. To stop unauthorized
access to the computer system we should
a.
Have a trustworthy system administrator
b.
Have a good passwords policy
c.
Have a sound encryption policy
d.
All of the above
No comments:
Post a Comment