Q1. Which protocol assigns IP address to the client connected in the Internet?
(a) DHCP
(b) IP
(c) RPC
(d) None of the above
(e) All of the above
Q2. Bluetooth makes use of Personal Area Network for wireless communication using Frequency hoping spread spectrum. Bluetooth supports –
(a) Point to point connections
(b) Point to Multipoint connection
(c) Both (a) and (b)
(d) None of the above
(e) Multipoint to point connection
Q3. The _______ translates internet domain and host names to IP address.
(a) DNS
(b) Routing Information Protocol
(c) Network Time Protocol
(d) Internet Relay chat
(e) File transfer protocol
Q4. On august 25 2016 Linux celebrated its 25 years of existence .LINUX is open source OS.
Who developed LINUX?
(a) Bill gates
(b) Steve Jobs
(c) Linus Torrvalds
(d) Ken thompson
(e) Dennis Ritchie
Q5. Which of the following computer languages is a mathematically oriented language for scientific problems?
(a) FORTRAN
(b) PROLOG
(c) COBOL
(d) LISLP
(e) APPLE
Q6. Encryption and Decryption are functions of
(a) Transport layer
(b) Session layer
(c) Presentation layer
(d) All of the above
(e) None of these
Q7.______ are attempts by individuals to obtain confidential information from you by falsifying their identity?
(a) Phishing trips
(b) Spyware scams
(c) Phishing scams
(d) Virus
(e) Computer viruses
Q8. Where it is likely to find an embedded operating system?
(a) Networked PC
(b) Mainframe
(c) Networked pc
(d) On a PDA
(e) On a operating system
Q9. Compiler in a computer system is :
(a) program
(b) System software
(c) Application software
(d) Process
(e) None of these
Q10. The human readable version of a program is called:
(a) Source code
(b) Program code
(c) System code
(d) Human code
(e) None of these
Q11. Software programs that close potential security breaches in an operating system :
(a) Refresh patches
(b) Security breach fixes
(c) Security patches
(d) Fresh patches
(e) Security repairs
Q12. _______ is the process of finding errors in software code?
(a) Compiling
(b) Testing
(c) Running
(d) Debugging
(e) None of these
Q13. Which feature provides a cloud storage area where ou can store files in a private and secure online location that you can access from any computer?
(a) SkyDrive
(b) Wireless drop
(c) Network
(d) Overdrive
(e) Cloud connect
Q14. What is the core of the operating system?
(a) Scripts
(b) Commands
(c) Shell
(d) Core space
(e) Kernel
Q15. The scrambling of code is known as____
(a) Firewalling
(b) Deception
(c) Password proofing
(d) Encryption
(e) Permuting