1.
The term ‘remote’ in network means
a.
A device that cannot control network functions
b.
Machine located far off
c.
Any peripheral or application located far off
d.
FEP
2.
Which access control mechanism does security label fit into?
a.
Logical access control
c.
Physical access control
d.
None of these
3.
A character that retains its value during program execution
is______
a.
Constant
b.
Variables
c.
Type definitions
d.
Function
4.
All decisions for a LAN
are taken by
a.
The it steering committee
b.
The top management
c.
A business analyst
d.
A project manager
5.
Generation of PIN in Bank ATM would require :
a.
Acquirer validates
b.
Acquirer sends response to the acceptor
c.
Authorizations request is sent to the acquirer
d.
PIN entered is encrypted
6.
_______are self
replicating malicious code independent of the action of the user, but slow down the processor on entering a network
a.
Viruses
b.
Worms
c.
Trojan Horse
d.
None of the above
7.
Physical access to a database can be altered by which factors?
a.
OS used by the software
b.
Hiring Procedure
c.
Biometric security tools
d.
Access privileges
8.
Steganography is
a.
Hiding the data to make it necessarily invisible and not easily
detectable
b.
Hiding the data but not necessarily making it invisible and not
easily detectable
c.
Detecting and destroying the hidden data
d.
None of these
9.
Mark I computer was
a.
Electrical machine
b.
Mechanical Machine
c.
Electronic Machine
d.
None of these
10. A computer faster with
a.
GUI
b.
Mouse
c.
Keyboard
d.
None of these
11. Which of the following
do you think is NOT required to develop an application for computer?
a.
Feasibility study
b.
Designing
c.
Testing
d.
None of these
12. The data flow diagram is
for analyzing
a.
How to do a function efficiently
b.
Restrict the number of times a function can be performed
c.
Requirements of user
d.
None of these
13. Buffer is device/storage
area:
a.
Where data are temporarily stored
b.
Where data is permanently stored
c.
Where data error occurs
d.
All of the above
14. A network geometric
arrangement in which a single connecting line is shared by a number
of nodes is called:
a.
Car Topology
b.
Bus Topology
c.
Truck Topology
d.
All of the above
15. An error in a computer
program is referred as:
a.
Bug
b.
Bit
c.
Virus
d.
All of the above
16. Circuits that provide a
communication path between two or more devices of a digital computer system is:
a.
Car
b.
Bus
c.
Truck
d.
All of the above
17. A fixed number of adjacent
bits that represent a particular character or symbol are referred
as:
a.
Byte
b.
Octal
c.
Bubble
d.
All of the above
18. Cache memory is a:
a.
Small buffer storage
b.
Permanent storage
c.
Main memory
d.
All of the above
19. The total number of digits
(symbols) available to represent numbers in a positional number
system is referred as:
a.
Number system
b.
Base
c.
Power
d.
All of the above
20. Cache memory is:
a.
Smaller and faster than main storage
b.
Bigger and slower than main storage
c.
Smaller but slower than main memory
d.
Bigger and faster than main memory
No comments:
Post a Comment